CASP ? 328-349

20 Questions | Attempts: 115
Share
Please wait...

Question 1 / 20
0 %
0/100
Score 0/100
1. 335. An audit at a popular on-line shopping site reveals that a flaw in the website allows customers to purchase goods at a discounted rate. To improve security the Chief Information Security Officer (CISO) has requested that the web based shopping cart application undergo testing to validate user input in both free form text fields and drop down boxes. Which of the following is the BEST combination of tools and / or methods to use?
Submit
Please wait...
About This Quiz
CASP ? 328-349 - Quiz

Personalize your quiz and earn a certificate with your name on it!
2. 342.  -- Exhibit – -- Exhibit -- Company management has indicated that instant messengers (IM) add to employee productivity. Management would like to implement an IM solution, but does not have a budget for the project. The security engineer creates a feature matrix to help decide the most secure product. Click on the Exhibit button. Which of the following would the security engineer MOST likely recommend based on the table?
Submit
3. 345. When generating a new key pair, a security application asks the user to move the mouse and type random characters on the keyboard. Which of the following BEST describes why this is necessary?
Submit
4. 332.  The security administrator has just installed an active\passive cluster of two firewalls for enterprise perimeter defense of the corporate network. Stateful firewall inspection is being used in the firewall implementation. There have been numerous reports of dropped connections with external clients. Which of the following is MOST likely the cause of this problem?
Submit
5. 330. In developing a new computing lifecycle process for a large corporation, the security team is developing the process for decommissioning computing equipment. In order to reduce the potential for data leakage, which of the following should the team consider? (Select TWO).
Submit
6. 347. A medium-sized company has recently launched an online product catalog. It has decided to keep the credit card purchasing in-house as a secondary potential income stream has been identified in relation to sales leads. The company has decided to undertake a PCI assessment in order to determine the amount of effort required to meet the business objectives. Which compliance category would this task be part of?
Submit
7. 340. Which of the following protocols only facilitates access control?
Submit
8. 349.  An Association is preparing to upgrade their firewalls at five locations around the United States. Each of the three vendor's RFP responses is in-line with the security and other requirements. Which of the following should the security administrator do to ensure the firewall platform is appropriate for the Association?
Submit
9. 336. An external auditor has found that IT security policies in the organization are not maintained and in some cases are nonexistent. As a result of the audit findings, the CISO has been tasked with the objective of establishing a mechanism to manage the lifecycle of IT security policies. Which of the following can be used to BEST achieve the CISO's objectives?
Submit
10. 339. A Security Administrator has some concerns about the confidentiality of data when using SOAP. Which of the following BEST describes the Security Administrator's concerns?
Submit
11. 328. Which of the following is an example of single sign-on?
Submit
12. 348. Company XYZ recently acquired a manufacturing plant from Company ABC which uses a different manufacturing ICS platform. Company XYZ has strict ICS security regulations while Company ABC does not. Which of the following approaches would the network security administrator for Company XYZ MOST likely proceed with to integrate the new manufacturing plant?
Submit
13. 329. Company XYZ has just purchased Company ABC through a new acquisition. A business decision has been made to integrate the two company's networks, application, and several basic services. The initial integration of the two companies has specified the following requirements: Company XYZ requires access to the web intranet, file, print, secure FTP server, and authentication domain resources Company XYZ is being on boarded into Company ABC's authentication domain Company XYZ is considered partially trusted Company XYZ does not want performance issues when accessing ABC's systems Which of the following network security solutions will BEST meet the above requirements?
Submit
14. 341.  Company ABC will test connecting networks with Company XYZ as part of their upcoming merger and are both concerned with minimizing security exposures to each others network throughout the test. Which of the following is the FIRST thing both sides should do prior to connecting the networks?
Submit
15. 333. Company XYZ is in negotiations to acquire Company ABC for $1.2millon. Due diligence activities have uncovered systemic security issues in the flagship product of Company ABC. It has been established that a complete product rewrite would be needed with average estimates indicating a cost of $1.6millon. Which of the following approaches should the risk manager of Company XYZ recommend?
Submit
16. 331. A Security Manager is part of a team selecting web conferencing systems for internal use. The system will only be used for internal employee collaboration. Which of the following are the MAIN concerns of the security manager? (Select THREE).
Submit
17. 343. An administrator attempts to install the package "named.9.3.6-12-x86_64.rpm" on a server. Even though the package was downloaded from the official repository, the server states the package cannot be installed because no GPG key is found. Which of the following should the administrator perform to allow the program to be installed?
Submit
18. 337. In a SPML exchange, which of the following BEST describes the three primary roles?
Submit
19. 344. Two storage administrators are discussing which SAN configurations will offer the MOST confidentiality. Which of the following configurations would the administrators use? (Select TWO).
Submit
20. 334.  Which of the following are components defined within an Enterprise Security Architecture Framework? (Select THREE).
Submit
View My Results

Quiz Review Timeline (Updated): Apr 8, 2014 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 08, 2014
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 08, 2014
    Quiz Created by
    Bcorazza
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
335. An audit at a popular on-line shopping site reveals that a flaw...
342.  -- Exhibit – ...
345. When generating a new key pair, a security application asks the...
332.  The security administrator has just installed an...
330. In developing a new computing lifecycle process for a large...
347. A medium-sized company has recently launched an online product...
340. Which of the following protocols only facilitates access control?
349.  An Association is preparing to upgrade their firewalls at...
336. An external auditor has found that IT security policies in the...
339. A Security Administrator has some concerns about the...
328. Which of the following is an example of single sign-on?
348. Company XYZ recently acquired a manufacturing plant from Company...
329. Company XYZ has just purchased Company ABC through a new...
341.  Company ABC will test connecting networks with Company XYZ...
333. Company XYZ is in negotiations to acquire Company ABC for...
331. A Security Manager is part of a team selecting web conferencing...
343. An administrator attempts to install the package...
337. In a SPML exchange, which of the following BEST describes the...
344. Two storage administrators are discussing which SAN...
334.  Which of the following are components defined within an...
Alert!

Advertisement