This quiz tests your knowledge on securing mobile devices, cloud environments, and incident response processes, tailored for those preparing for the CompTIA CASP certification. It assesses critical security skills essential for top IT roles.
Remind users that all emails with sensitive information need be encrypted and physically inspect the cloud computing.
Ensure logins are over an encrypted channel and obtain an NDA and an SLA from the cloud provider.
Ensure logins are over an encrypted channel and remind users to encrypt all emails that contain sensitive information.
Obtain an NDA from the cloud provider and remind users that all emails with sensitive information need be encrypted.
Rate this question:
Mitigate and Transfer
Accept and Transfer
Transfer and Avoid
Avoid and Mitigate
Rate this question:
E-Discovery
Data handling
Incident response
Data recovery and storage
Rate this question:
Database Administrator
Human Resources
Finance
Network Administrator
IT Management
Rate this question:
XACML
OCSP
ACL
CRL
Rate this question:
Backup policy
De-provisioning policy
Data retention policy
Provisioning policy
Rate this question:
SQL injection
XSS scripting
Click jacking
Input validation
Rate this question:
Unplug the network cable to avoid network activity.
Reboot the workstation to see if problem occurs again.
Turn off the computer to avoid any more issues.
Contact the incident response team for direction.
Rate this question:
Confidentiality
Authentication
Integrity
Availability
Rate this question:
Network-based intrusion prevention system
Data loss prevention
Host-based intrusion detection system
Web application firewall
Rate this question:
HTTP interceptor
Vulnerability scanner
Port scanner
Fuzzer
Rate this question:
Penetration test across the application with accounts of varying access levels (i.e. nonauthenticated, authenticated, and administrative users).
Code review across critical modules to ensure that security defects, Trojans, and backdoors are not present.
Vulnerability assessment across all of the online banking servers to ascertain host and container configuration lock-down and patch levels.
Fingerprinting across all of the online banking servers to ascertain open ports and services.
Black box code review across the entire code base to ensure that there are no security defects present.
Rate this question:
Allow only the executive management team the ability to use personal devices on the company network, as they have important responsibilities and need convenient access.
Review the security policy. Perform a risk evaluation of allowing devices that can be centrally managed, remotely disabled, and have device-level encryption of sensitive data.
Stand firm on disallowing non-company assets from connecting to the network as the assets may lead to undesirable security consequences, such as sensitive emails being leaked outside the company.
Allow only certain devices that are known to have the ability of being centrally managed. Do not allow any other smartphones until the device is proven to be centrally managed.
Rate this question:
Business requirements document
Requirements traceability matrix document
Use case and viewpoints document
Solution overview document
Rate this question:
A product that provides IT-specific governance, risk management, and compliance.
A form of reconnaissance used by penetration testers to discover listening hosts.
A synonymous term for computer emergency response and incident handling.
A process of producing electronically stored information for use as evidence.
Rate this question:
Document the security requirements in an email and move on to the next most urgent task.
Organize for a requirements workshop with the non-technical project members, being the HR and transformation management consultants.
Communicate the security requirements with all stakeholders for discussion and buy-in.
Organize for a requirements workshop with the technical project members, being the database, network, and application consultants.
Rate this question:
Requirements workshop
Security development lifecycle (SDL)
Security requirements traceability matrix (SRTM)
Secure code review and penetration test
Rate this question:
Email spamming
IP spoofing
Clickjacking
DNS replication
Rate this question:
Business impact analysis
Annualized loss expectancy analysis
TCO analysis
Residual risk and gap analysis
Rate this question:
Assess system status
Restore from backup tapes
Conduct a business impact analysis
Review NIDS logs
Rate this question:
Shut the server down and image the hard drive.
Remove all power sources from the server.
Install remote backup software and copy data to write-once media.
Login remotely and perform a full backup of the server.
Rate this question:
Engineers
Facilities Manager
Stakeholders
Human Resources
Rate this question:
Contact vendor management so the RFI and RFP process can be started as soon as possible. user accounts and reviews of system logs.
Contact an independent consultant who can tell them what policies and solutions they need. through a SSL portal. Perform regular audits of user accounts and reviews of system logs.
Discuss requirements with stakeholders from the various internal departments. active hostile threats.
Involve facilities management early in the project so they can plan for the new security hardware in the data center. Regularly perform user revalidation.
Rate this question:
Develop a security policy that defines remote access requirements. Perform regular audits of user accounts and reviews of system logs.
Secure remote access systems to ensure shared drives are read only and access is provided through a SSL portal. Perform regular audits of user accounts and reviews of system logs.
Plan and develop security policies based on the assumption that external environments have active hostile threats.
Implement a DLP program to log data accessed by users connecting via remote access. Regularly perform user revalidation.
Rate this question:
Implement SCADA security measures.
Implement NIPS to prevent the unauthorized activity.
Implement an AAA solution.
Implement a firewall to restrict access to only a single management station.
Rate this question:
Implement NIPS inline between the web server and the firewall.
Implement a web application firewall inline between the web server and the firewall.
Implement host intrusion prevention on all machines at the bank.
Configure the firewall policy to only allow communication with the web server using SSL.
Rate this question:
Require a digital signature on all outgoing emails.
Sanitize outgoing content.
Implement a data classification policy.
Implement a SPAM filter.
Rate this question:
Conduct web server load tests.
Conduct static code analysis.
Conduct fuzzing attacks.
Conduct SQL injection and XSS attacks.
Rate this question:
Conduct a compliance review
Conduct a vulnerability assessment
Conduct a vulnerability assessment
Conduct a full system audit
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.