CSA Plus Certification Quiz

10 Questions | Total Attempts: 35

SettingsSettingsSettings
CSA Plus Certification Quiz

The CSA+ certification allows you to recognize and solve some of the most complicated security issues when it comes to IT and everything that depends on it. It is obvious that you must know how to solve security issues, or even better, prevent them. We've put up a quiz for you so you can see if you truly master the risks that are encountered by every computer users and IT technicians out there. Try it and see if you can pass it easily.


Questions and Answers
  • 1. 
    Mark is helping a system administrator set up a secure RDP connection for use in managing Windows systems remotely but the connection is failing. He believes that he needs to create a new firewall rule to allow this communication.What port does RDP use for network communication?
    • A. 

      3389

    • B. 

      22

    • C. 

      443

    • D. 

      1443

  • 2. 
    Alexander is a security professional seeking to help secure a new SaaS file storage service for end users. He would like to manage encryption keys himself so that the cloud provider cannot access data stored in the service.What type of appliance can help him achieve this goal?
    • A. 

      IPS

    • B. 

      Cloud Storage Gateway

    • C. 

      HSM

    • D. 

      Firewall

  • 3. 
    Zara works for a newspaper and is developing a communication system that would facilitate secure, anonymous communication between journalists and their sources. She is considering using Tor because of a feature that allows individuals to communicate over the network by using relay nodes that do not know the identity of the sender or recipient.What is the correct name of this feature?
    • A. 

      Non-repudiation

    • B. 

      Perfect forward secrecy

    • C. 

      Key Stretching

    • D. 

      Transport Encryption.

  • 4. 
    Which one of the following storage protocols does not use an IP-based approach to network communications?
    • A. 

      NFS

    • B. 

      FCoE

    • C. 

      ISCSI

    • D. 

      CIFS

  • 5. 
    Tommy is working with his organization’s platforms team to select a virtualization approach for use in their data center. To provide stronger security, he would like to select a hypervisor that runs directly on bare metal hardware without an intervening host operating system.What type of hypervisor should he choose?
    • A. 

      Type 1

    • B. 

      Type 2

    • C. 

      Type 3

    • D. 

      Type 4

  • 6. 
    Eddy is seeking a security solution that will allow him to prevent the use of encrypted hard drives in systems other than their intended host. What technology can best assist Cory in achieving this goal?
    • A. 

      TPM

    • B. 

      HSM

    • C. 

      IPS

    • D. 

      CSG

  • 7. 
    Annie would like to protect her organization’s web applications against a broad range of web application attacks. Which control is best designed to meet this objective?
    • A. 

      IPS

    • B. 

      DAM

    • C. 

      HIPS

    • D. 

      WAF

  • 8. 
    Melanie would like to digitally sign a message that she is sending to her colleague, Harry. What key should Melanie use to create the digital signature?
    • A. 

      Melanie's public key

    • B. 

      Melanie's private key

    • C. 

      Harry's public key

    • D. 

      Harry's private

  • 9. 
    Suzy is inspecting her application logs and finds log records that indicate attackers may be attempting to use SQL injection attacks to access the database underlying her application.What is the most effective security control that Suzy can apply to address this risk?
    • A. 

      Input validation

    • B. 

      Application sandboxing

    • C. 

      Host firewall

    • D. 

      Network firework

  • 10. 
    Jeremy is planning to migrate the backups of his on-premises systems to a cloud provider using a cloud storage gateway. He would like to reduce the amount of storage used and optimize storage classifications in an effort to minimize costs.Which one of the following features will not assist with this goal?
    • A. 

      Automatic archiving.

    • B. 

      Compression.

    • C. 

      Encryption.

    • D. 

      Deduplication.

Back to Top Back to top