This Comptia CASP Certification Trivia Quiz assesses your knowledge on cybersecurity, focusing on preventing attacks, authentication mechanisms, and securing virtual environments. Ideal for professionals aiming to validate their advanced security skills.
LDAP
RADIUS
TACACS+
Kerberos
Rate this question:
Anti-spam software
Application sandboxing
Data loss prevention
Input validation
Rate this question:
Entropy should be enabled on all SSLv2 transactions.
AES256-CBC should be implemented for all encrypted data.
PFS should be implemented on all VPN tunnels.
PFS should be implemented on all SSH connections.
Rate this question:
A stolen two factor token and a memory mapping RAM exploit were used to move data from A stolen two factor token and a memory mapping RAM exploit were used to move data from one virtual guest to an unauthorized similar token.
An employee with administrative access to the virtual guests was able to dump the guest memory onto their mapped disk.
A host server was left un-patched and an attacker was able to use a VMEscape attack to gain unauthorized access.
A virtual guest was left un-patched and an attacker was able to use a privilege escalation attack to gain unauthorized access.
Rate this question:
All four companies must implement a TACACS+ web based single sign-on solution with associated captive portal technology.
Company XYZ must implement VPN and strict access control to allow the other three companies to access the internal LDAP.
Company XYZ needs to install the SP, while the partner companies need to install the WAYF portion of a Federated identity solution.
Company XYZ needs to install the IdP, while the partner companies need to install the SP portion of a Federated identity solution.
Rate this question:
Security awareness and user training
Recursive DNS from the root servers
Configuring and deploying TSIG
Firewalls and IDS technologies
Rate this question:
The security administrator must install the third party web enabled application in a chroot environment.
The security administrator must install a software firewall on both the Linux server and the virtual machines.
The security administrator must install anti-virus software on both the Linux server and the virtual machines.
The security administrator must install the data exfiltration detection software on the perimeter firewall.
Rate this question:
A DAC which enforces no read-up, a DAC which enforces no write-down, and a MAC which uses an access matrix.
A MAC which enforces no write-up, a MAC which enforces no read-down, and a DAC which uses an ACL.
A MAC which enforces no read-up, a MAC which enforces no write-down, and a DAC which uses an access matrix.
A DAC which enforces no write-up, a DAC which enforces no read-down, and a MAC which uses an ACL.
Rate this question:
Wait for the external audit results
Perform another COOP exercise
Implement mandatory training
Destroy the financial transactions
Review company procedures
Rate this question:
SLA
ISA
NDA
BPA
Emerging threat reports
Company attack tends
Request for Quote (RFQ)
Best practices
New technologies report
Rate this question:
Employee’s professional reputation
Intellectual property confidentiality loss
Downloaded viruses on the company laptops
Workstation compromise affecting availability
Rate this question:
Review the HR termination process and ask the software developers to review the identity management code.
Enforce the company policy by conducting monthly account reviews of inactive accounts.
Review the termination policy with the company managers to ensure prompt reporting of employee terminations.
Update the company policy to account for delays and unforeseen situations in account deactivation.
Rate this question:
The browser asks the SP for a resource. The SP provides the browser with an XHTML format. The browser asks the IdP to validate the user, and then provides the XHTML back to the SP for access.
The browser asks the IdP for a resource. The IdP provides the browser with an XHTML format. The browser asks the SP to validate the user, and then provides the XHTML to the IdP for access.
The browser asks the IdP to validate the user. The IdP sends an XHTML form to the SP and a cookie to the browser. The browser asks for a resource to the SP, which verifies the cookie and XHTML format for access.
The browser asks the SP to validate the user. The SP sends an XHTML form to the IdP. The IdP provides the XHTML form back to the SP, and then the browser asks the SP for a resource.
Regression testing by the manufacturer and integration testing by the third party
User acceptance testing by the manufacturer and black box testing by the third party
Defect testing by the manufacturer and user acceptance testing by the third party
White box unit testing by the manufacturer and black box testing by the third party
Rate this question:
Quickly research best practices with respect to stopping Conficker infections and implement the solution.
Consult with the rest of the security team and get approval on the solution by all the team members and the team manager.
Apply the ACL immediately since this is an emergency that could lead to a widespread data compromise.
Call an emergency change management meeting to ensure the ACL will not impact core business functions.
Rate this question:
VPN concentrator
Firewall
Proxy server
WAP
Layer 2 switch
Rate this question:
Option 1
Option 2
Option 3
Option 4
Rate this question:
Option 1
Option 2
Option 3
Option 4
Distributed patch management system where all systems in production are patched as updates are released.
Central patch management system where all systems in production are patched by automatic updates as they are released.
Central patch management system where all updates are tested in a lab environment after being installed on a live production system.
Distributed patch management system where all updates are tested in a lab environment prior to being installed on a live production system.
Rate this question:
Accepting risk
Mitigating risk
Identifying risk
Transferring risk
Rate this question:
Data ownership on all files
Data size on physical disks
Data retention policies on only file servers
Data recovery and storage
Rate this question:
IOS
ISA
SLA
OLA
Rate this question:
RFI
RTO
RFQ
RFC
Rate this question:
RFC
RTO
RFQ
RFI
Rate this question:
Configure 802.11b on the network
Configure 802.1q on the network
Configure 802.11e on the network
Update the firewall managing the SIP servers
Update the HIDS managing the SIP servers
Rate this question:
Operations and Maintenance
Implementation
Acquisition and Development
Initiation
Rate this question:
Social Engineering
Penetration Test
Vulnerability Assessment
Code Review
Rate this question:
SRTM review
Fuzzer
Vulnerability assessment
HTTP interceptor
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.