CompTIA CASP Certification Test! Trivia Quiz

30 Questions

Settings
CASP Quizzes & Trivia

CASP STUDY? 1-30


Questions and Answers
  • 1. 
    Which of the following attacks does Unicast Reverse Path Forwarding prevent?
    • A. 

      Man in the Middle

    • B. 

      ARP poisoning

    • C. 

      Broadcast storm

    • D. 

      IP Spoofing

  • 2. 
    Which of the following authentication types is used primarily to authenticate users through the use of tickets?
    • A. 

      LDAP

    • B. 

      RADIUS

    • C. 

      TACACS+

    • D. 

      Kerberos

  • 3. 
    A security consultant is evaluating forms which will be used on a company website. Which of the following techniques or terms is MOST effective at preventing malicious individuals from successfully exploiting programming flaws in the website?
    • A. 

      Anti-spam software

    • B. 

      Application sandboxing

    • C. 

      Data loss prevention

    • D. 

      Input validation

  • 4. 
    • A. 

      Entropy should be enabled on all SSLv2 transactions.

    • B. 

      AES256-CBC should be implemented for all encrypted data.

    • C. 

      PFS should be implemented on all VPN tunnels.

    • D. 

      PFS should be implemented on all SSH connections.

  • 5. 
    A company provides on-demand virtual computing for a sensitive project. The company implements a fully virtualized datacenter and terminal server access with two-factor authentication for access to sensitive data. The security administrator at the company has uncovered a breach in data confidentiality. Sensitive data was found on a hidden directory within the hypervisor. Which of the following has MOST likely occurred?
    • A. 

      A stolen two factor token and a memory mapping RAM exploit were used to move data from A stolen two factor token and a memory mapping RAM exploit were used to move data from one virtual guest to an unauthorized similar token.

    • B. 

      An employee with administrative access to the virtual guests was able to dump the guest memory onto their mapped disk.

    • C. 

      A host server was left un-patched and an attacker was able to use a VMEscape attack to gain unauthorized access.

    • D. 

      A virtual guest was left un-patched and an attacker was able to use a privilege escalation attack to gain unauthorized access.

  • 6. 
    • A. 

      All four companies must implement a TACACS+ web based single sign-on solution with associated captive portal technology.

    • B. 

      Company XYZ must implement VPN and strict access control to allow the other three companies to access the internal LDAP.

    • C. 

      Company XYZ needs to install the SP, while the partner companies need to install the WAYF portion of a Federated identity solution.

    • D. 

      Company XYZ needs to install the IdP, while the partner companies need to install the SP portion of a Federated identity solution.

  • 7. 
    The security administrator at a bank is receiving numerous reports that customers are unable to login to the bank website. Upon further investigation, the security administrator discovers that the name associated with the bank website points to an unauthorized IP address. Which of the following solutions will MOST likely mitigate this type of attack?
    • A. 

      Security awareness and user training

    • B. 

      Recursive DNS from the root servers

    • C. 

      Configuring and deploying TSIG

    • D. 

      Firewalls and IDS technologies

  • 8. 
    • A. 

      The security administrator must install the third party web enabled application in a chroot environment.

    • B. 

      The security administrator must install a software firewall on both the Linux server and the virtual machines.

    • C. 

      The security administrator must install anti-virus software on both the Linux server and the virtual machines.

    • D. 

      The security administrator must install the data exfiltration detection software on the perimeter firewall.

  • 9. 
    A breach at a government agency resulted in the public release of top secret information. The Chief Information Security Officer has tasked a group of security professionals to deploy a system which will protect against such breaches in the future. Which of the following can the government agency deploy to meet future security needs?
    • A. 

      A DAC which enforces no read-up, a DAC which enforces no write-down, and a MAC which uses an access matrix.

    • B. 

      A MAC which enforces no write-up, a MAC which enforces no read-down, and a DAC which uses an ACL.

    • C. 

      A MAC which enforces no read-up, a MAC which enforces no write-down, and a DAC which uses an access matrix.

    • D. 

      A DAC which enforces no write-up, a DAC which enforces no read-down, and a MAC which uses an ACL.

  • 10. 
    The internal auditor at Company ABC has completed the annual audit of the company’s financial system. The audit report indicates that the accounts receivable department has not followed proper record disposal procedures during a COOP/BCP tabletop exercise involving manual processing of financial transactions. Which of the following should be the Information Security Officer’s (ISO’s) recommendation? (Select TWO).
    • A. 

      Wait for the external audit results

    • B. 

      Perform another COOP exercise

    • C. 

      Implement mandatory training

    • D. 

      Destroy the financial transactions

    • E. 

      Review company procedures

  • 11. 
    Company ABC has recently completed the connection of its network to a national high speed private research network. Local businesses in the area are seeking sponsorship from Company ABC to connect to the high speed research network by directly connecting through Company ABC’s network. Company ABC’s Chief Information Officer (CIO) believes that this is an opportunity to increase revenues and visibility for the company, as well as promote research and development in the area. Which of the following must Company ABC require of its sponsored partners in order to document the technical security requirements of the connection?
    • A. 

      SLA

    • B. 

      ISA

    • C. 

      NDA

    • D. 

      BPA

  • 12. 
    A security analyst at Company A has been trying to convince the Information Security Officer (ISO) to allocate budget towards the purchase of a new intrusion prevention system (IPS) capable of analyzing encrypted web transactions. Which of the following should the analyst provide to the ISO to support the request? (Select TWO).
    • A. 

      Emerging threat reports

    • B. 

      Company attack tends

    • C. 

      Request for Quote (RFQ)

    • D. 

      Best practices

    • E. 

      New technologies report

  • 13. 
    The IT department of a pharmaceutical research company is considering whether the company should allow or block access to social media websites during lunch time. The company is considering the possibility of allowing access only through the company’s guest wireless network, which is logically separated from the internal research network. The company prohibits the use of personal devices; therefore, such access will take place from company owned laptops. Which of the following is the HIGHEST risk to the organization?
    • A. 

      Employee’s professional reputation

    • B. 

      Intellectual property confidentiality loss

    • C. 

      Downloaded viruses on the company laptops

    • D. 

      Workstation compromise affecting availability

  • 14. 
    A security audit has uncovered a lack of security controls with respect to employees’ network account management. Specifically, the audit reveals that employee’s network accounts are not disabled in a timely manner once an employee departs the organization. The company policy states that the network account of an employee should be disabled within eight hours of termination. However, the audit shows that 5% of the accounts were not terminated until three days after a dismissed employee departs. Furthermore, 2% of the accounts are still active. Which of the following is the BEST course of action that the security officer can take to avoid repeat audit findings?
    • A. 

      Review the HR termination process and ask the software developers to review the identity management code.

    • B. 

      Enforce the company policy by conducting monthly account reviews of inactive accounts.

    • C. 

      Review the termination policy with the company managers to ensure prompt reporting of employee terminations.

    • D. 

      Update the company policy to account for delays and unforeseen situations in account deactivation.

  • 15. 
    Which of the following is true about an unauthenticated SAMLv2 transaction?
    • A. 

      The browser asks the SP for a resource. The SP provides the browser with an XHTML format. The browser asks the IdP to validate the user, and then provides the XHTML back to the SP for access.

    • B. 

      The browser asks the IdP for a resource. The IdP provides the browser with an XHTML format. The browser asks the SP to validate the user, and then provides the XHTML to the IdP for access.

    • C. 

      The browser asks the IdP to validate the user. The IdP sends an XHTML form to the SP and a cookie to the browser. The browser asks for a resource to the SP, which verifies the cookie and XHTML format for access.

    • D. 

      The browser asks the SP to validate the user. The SP sends an XHTML form to the IdP. The IdP provides the XHTML form back to the SP, and then the browser asks the SP for a resource.

  • 16. 
    A company which manufactures ASICs for use in an IDS wants to ensure that the ASICs’ code is not prone to buffer and integer overflows. The ASIC technology is copyrighted and the confidentiality of the ASIC code design is exceptionally important. The company is required to conduct internal vulnerability testing as well as testing by a third party. Which of the following should be implemented in the SDLC to achieve these requirements?
    • A. 

      Regression testing by the manufacturer and integration testing by the third party

    • B. 

      User acceptance testing by the manufacturer and black box testing by the third party

    • C. 

      Defect testing by the manufacturer and user acceptance testing by the third party

    • D. 

      White box unit testing by the manufacturer and black box testing by the third party

  • 17. 
    The security administrator is receiving numerous alerts from the internal IDS of a possible Conficker infection spreading through the network via the Windows file sharing services. Given the size of the company which deploys over 20,000 workstations and 1,000 servers, the security engineer believes that the best course of action is to block the file sharing service across the organization by placing ACLs on the internal routers. Which of the following should the security administrator do before applying the ACL?
    • A. 

      Quickly research best practices with respect to stopping Conficker infections and implement the solution.

    • B. 

      Consult with the rest of the security team and get approval on the solution by all the team members and the team manager.

    • C. 

      Apply the ACL immediately since this is an emergency that could lead to a widespread data compromise.

    • D. 

      Call an emergency change management meeting to ensure the ACL will not impact core business functions.

  • 18. 
    A company currently does not use any type of authentication or authorization service for remote access. The new security policy states that all remote access must be locked down to only authorized personnel. The policy also dictates that only authorized external networks will be allowed to access certain internal resources. Which of the following would MOST likely need to be implemented and configured on the company’s perimeter network to comply with the new security policy? (Select TWO).
    • A. 

      VPN concentrator

    • B. 

      Firewall

    • C. 

      Proxy server

    • D. 

      WAP

    • E. 

      Layer 2 switch

  • 19. 
    Which of the following displays an example of a buffer overflow attack?
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 20. 
    Which of the following displays an example of a XSS attack?
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 21. 
    Several critical servers are unresponsive after an update was installed. Other computers that have not yet received the same update are operational, but are vulnerable to certain buffer overflow attacks. The security administrator is required to ensure all systems have the latest updates while minimizing any downtime. Which of the following is the BEST risk mitigation strategy to use to ensure a system is properly updated and operational?
    • A. 

      Distributed patch management system where all systems in production are patched as updates are released.

    • B. 

      Central patch management system where all systems in production are patched by automatic updates as they are released.

    • C. 

      Central patch management system where all updates are tested in a lab environment after being installed on a live production system.

    • D. 

      Distributed patch management system where all updates are tested in a lab environment prior to being installed on a live production system.

  • 22. 
    A business is currently in the process of upgrading its network infrastructure to accommodate a personnel growth of over fifty percent within the next six months. All preliminary planning has been completed and a risk assessment plan is being adopted to decide which security controls to put in place throughout each phase. Which of the following risk responses is MOST likely being considered if the business is creating an SLA with a third party?
    • A. 

      Accepting risk

    • B. 

      Mitigating risk

    • C. 

      Identifying risk

    • D. 

      Transferring risk

  • 23. 
    Which of the following must be taken into consideration for e-discovery purposes when a legal case is first presented to a company?
    • A. 

      Data ownership on all files

    • B. 

      Data size on physical disks

    • C. 

      Data retention policies on only file servers

    • D. 

      Data recovery and storage

  • 24. 
    A company has purchased a new system, but security personnel are spending a great deal of time on system maintenance. A new third party vendor has been selected to maintain and manage the company’s system. Which of the following document types would need to be created before any work is performed?
    • A. 

      IOS

    • B. 

      ISA

    • C. 

      SLA

    • D. 

      OLA

  • 25. 
    • A. 

      RFI

    • B. 

      RTO

    • C. 

      RFQ

    • D. 

      RFC

  • 26. 
    A security administrator of a large private firm is researching and putting together a proposal to purchase an IPS. The specific IPS type has not been selected, and the security administrator needs to gather information from several vendors to determine a specific product. Which of the following documents would assist in choosing a specific brand and model?
    • A. 

      RFC

    • B. 

      RTO

    • C. 

      RFQ

    • D. 

      RFI

  • 27. 
    Wireless users are reporting issues with the company’s video conferencing and VoIP systems. The security administrator notices DOS attacks on the network that are affecting the company’s VoIP system (i.e. premature call drops and garbled call signals). The security administrator also notices that the SIP servers are unavailable during these attacks. Which of the following security controls will MOST likely mitigate the VoIP DOS attacks on the network? (Select TWO).
    • A. 

      Configure 802.11b on the network

    • B. 

      Configure 802.1q on the network

    • C. 

      Configure 802.11e on the network

    • D. 

      Update the firewall managing the SIP servers

    • E. 

      Update the HIDS managing the SIP servers

  • 28. 
    A company has decided to use the SDLC for the creation and production of a new information system. The security administrator is training all users on how to protect company information while using the new system, along with being able to recognize social engineering attacks. Senior Management must also formally approve of the system prior to it going live. In which of the following phases would these security controls take place?
    • A. 

      Operations and Maintenance

    • B. 

      Implementation

    • C. 

      Acquisition and Development

    • D. 

      Initiation

  • 29. 
    A company contracts with a third party to develop a new web application to process credit cards. Which of the following assessments will give the company the GREATEST level of assurance for the web application?
    • A. 

      Social Engineering

    • B. 

      Penetration Test

    • C. 

      Vulnerability Assessment

    • D. 

      Code Review

  • 30. 
    As part of the testing phase in the SDLC, a software developer wants to verify that an application is properly handling user error exceptions. Which of the following is the BEST tool or process for the developer use?
    • A. 

      SRTM review

    • B. 

      Fuzzer

    • C. 

      Vulnerability assessment

    • D. 

      HTTP interceptor