This Comptia CASP Test Trivia Questions! Quiz assesses knowledge on control measures for security, data sanitization, network vulnerabilities, and secure computing solutions. Ideal for professionals aiming to enhance cybersecurity skills and understanding of industry best practices.
Write over the data
Purge the data
Incinerate the DVD
Shred the DVD
Rate this question:
The HTTPS is not being enforced so the system is vulnerable.
The numerical encoding on the session ID is limited to hexadecimal characters, making it susceptible to a brute force attack.
Sensitive data is transmitted in the URL.
The dates entered are outside a normal range, which may leave the system vulnerable to a denial of service attack.
Rate this question:
Traces of proprietary data which can remain on the virtual machine and be exploited
Remnants of network data from prior customers on the physical servers during a compute job
Exposure of proprietary data when in-transit to the cloud provider through IPSec tunnels
Failure of the de-provisioning mechanism resulting in excessive charges for the resources
Rate this question:
A hardened Red Hat Enterprise Linux implementation running a software firewall
Windows 7 with a secure domain policy and smartcard based authentication
A hardened bastion host with a permit all policy implemented in a software firewall
Solaris 10 with trusted extensions or SE Linux with a trusted policy
Rate this question:
Anti-malware/virus/spyware/spam software, as well as a host based firewall and strong, twofactor authentication.
Anti-virus/spyware/spam software, as well as a host based IDS, firewall, and strong three-factor authentication.
Anti-malware/virus/spyware/spam software, as well as a host based firewall and biometric authentication.
Anti-malware/spam software, as well as a host based firewall and strong, three-factor authentication.
Rate this question:
Error handling, input validation, memory use and reuse, race condition handling, commenting, and preventing typical security problems.
Error prevention, requirements validation, memory use and reuse, commenting typical security problems, and testing code standards.
Error elimination, trash collection, documenting race conditions, peer review, and typical security problems.
Error handling, input validation, commenting, preventing typical security problems, managing customers, and documenting extra requirements.
Rate this question:
Problem: Cross-site scripting Mitigation TechniquE. Input validation Security Concern: Decreases the company’s profits and cross-site scripting can enable malicious actors to compromise the confidentiality of network connections or interrupt the availability of the network.
Problem: Buffer overflow Mitigation TechniquE. Secure coding standards Security Concern: Exposes the company to liability buffer overflows and can enable malicious actors to compromise the confidentiality/availability of the data.
Problem: SQL injection Mitigation TechniquE. Secure coding standards Security Concern: Exposes the company to liability SQL injection and can enable malicious actors to compromise the confidentiality of data or interrupt the availability of a system.
Problem: Buffer overflow Mitigation TechniquE. Output validation Security Concern: Exposing the company to public scrutiny buffer overflows can enable malicious actors to interrupt the availability of a system.
Rate this question:
Vulnerability assessment
Code review
Social engineering
Reverse engineering
Rate this question:
Ability to remotely wipe the devices, apply security controls remotely, and encrypt the SSD; the track record of the vendor in publicizing and correcting security flaws in their products; predicted costs associated with maintaining, integrating and securing the devices.
Ability to remotely administer the devices, apply security controls remotely, and remove the SSD; the track record of the vendor in securely implementing IPv6 with IPSec; predicted costs associated with securing the devices.
Ability to remotely monitor the devices, remove security controls remotely, and decrypt the SSD; the track record of the vendor in publicizing and preventing security flaws in their products; predicted costs associated with maintaining, destroying and tracking the devices.
Ability to remotely sanitize the devices, apply security controls locally, encrypt the SSD; the track record of the vendor in adapting the open source operating system to their platform; predicted costs associated with inventory management, maintaining, integrating and securing the devices.
Rate this question:
The resulting impact of even one attack being realized might cripple the company financially.
Government health care regulations for the pharmaceutical industry prevent the director from approving a system with vulnerabilities.
The director is new and is being rushed to approve a project before an adequate assessment has been performed.
The director should be uncomfortable accepting any security vulnerabilities and should find time to correct them before the system is deployed.
Rate this question:
No effective controls in place
No transport security controls are implemented
Insufficient user authentication controls are implemented
IPv6 is not incorporated in the network
Rate this question:
The system shall cease processing data when certain configurable events occur.
The system shall continue processing in the event of an error and email the security administrator the error logs.
The system shall halt on error.
The system shall throw an error when specified incidents pass a configurable threshold.
Rate this question:
File an insurance claim and assure the executive the data is secure because it is encrypted.
Immediately implement a plan to remotely wipe all data from the device.
Have the executive change all passwords and issue the executive a new phone.
Execute a plan to remotely disable the device and report the loss to the police.
Rate this question:
Authentication
Authorization
SAML
Kerberos
Rate this question:
Digital encryption
Digital signing
Password entropy
Code signing
Rate this question:
Ease of patch testing
Reducing physical footprint
Reduced network traffic
Isolation of applications
Rate this question:
VLANs
VDI
PaaS
IaaS
Rate this question:
Discretionary Access control
Man trap
Visitor logs
Proximity readers
Motion detection sensors
Rate this question:
Input Validation
Application hardening
Code signing
Application sandboxing
Rate this question:
Separation of duties
Forensic tasks
MOU
OLA
NDA
Job rotation
Rate this question:
SIP and SRTP traffic analysis
QoS audit on Layer 3 devices
IP and MAC filtering logs
Email spam filter log
Rate this question:
A man in the middle attack is underway - implementing static ARP entries is a possible solution.
An ARP flood attack targeted at the router is causing intermittent communication – implementing IPS is a possible solution.
The default gateway is being spoofed - implementing static routing with MD5 is a possible solution.
The router is being advertised on a separate network - router reconfiguration is a possible solution.
Rate this question:
Data retention policy
Backup software and hardware
Email encryption software
Data recovery procedures
Rate this question:
Brute force attacks
Malware infection
DDOS attacks
Phishing attacks
SQL injection attacks
Social engineering attacks
Rate this question:
IPSec transport mode is enabled
ICMP is disabled
Split tunneling is disabled
NAT-traversal is enabled
Rate this question:
Revise the hardware and software maintenance contract.
Degauss the printer hard drive to delete data.
Implement a new change control process.
Update the hardware decommissioning procedures.
Rate this question:
Database servers should be on the same virtual server as web servers in the DMZ network segment.
Web servers should be on the same physical server as database servers in the network segment.
Virtual servers should only be on the same physical server as others in their network segment.
Physical servers should only be on the same WAN as other physical servers in their network.
Rate this question:
CIFS
NFS
ISCSI
NAS
Rate this question:
Secure cookie storage
Standard libraries
State management
Input validation
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.