24 CASP Questions Flashcards
A company has decided to replace all the T-1 uplinks at each regional office and move away from using the existing MPLS network. All regional sites will use high-speed connections and VPNs to connect back to the main campus. Which of the following devices would MOST likely be added at each location?
- SIEM
- IDS/IPS
- Proxy server
- Firewall
- Router
- Firewall
The director of sales asked the development team for some small changes to increase the usability of an application used by the sales team. Prior security reviews of the code showed no significant vulnerabilities, and since the changes were small, they were given a peer review and then pushed to the live environment. Subsequent vulnerability scans now show numerous flaws that were not present in the previous versions of the code. Which of the following is an SDLC best practice that should have been followed?
A. Versioning
B. Regression testing
C. Continuous integration
D. Integration testing
B. Regression testing
A government organization operates and maintains several ICS environments. The categorization of one of the ICS environments led to a moderate baseline. The organization has compiled a set of applicable security controls based on this categorization. Given that this is a unique environment, which of the following should the organization do NEXT to determine if other security controls should be considered?
A. Check for any relevant or required overlays
B. Review enhancements within the current control set
C. Modify to a high-baseline set of controls
D. Perform continuous monitoring
C. Modify to a high-baseline set of controls
A security engineer has been hired to design a device that will enable the exfiltration of data from within a well-defended network perimeter during an authorized test. The device must bypass all firewalls and NIDS in place, as well as allow for the upload of commands from a centralized command and control server. The total cost of the device must be kept to a minimum in case the device is discovered during an assessment. Which of the following tools should the engineer load onto the device being designed?
A. Custom firmware with rotating key generation
B. Automatic MITM proxy
C. TCP beacon broadcast software
D. Reverse shell endpoint listener
D. Reverse shell endpoint listener
An internal application has been developed to increase the efficiency of an operational process of a global manufacturer. New code was implemented to fix a security bug, but it has caused operations to halt. The executive team has decided fixing the security bug is less important than continuing operations. Which of the following would BEST support immediate rollback of the failed fix? (Select TWO).
A. Version control B. Agile development C. Waterfall development D. Change management E. Continuous integration F. Regression testing
A. Version control
D. Change management
An enterprise is trying to secure a specific web-based application by forcing the use of multifactor authentication. Currently, the enterprise cannot change the application’s sign-in page to include an extra field. However, the web-based application supports SAML. Which of the following would BEST secure the application?
A. Using an SSO application that supports multifactor authentication
B. Enabling the web application to support LDAP integration
C. Forcing higher-complexity passwords and frequent changes
D. Deploying Shibboleth to all web-based applications in the enterprise
A. Using an SSO application that supports multifactor authentication
A project manager is working with a software development group to collect and evaluate user scenarios related to the organizations internally designed data analytics tool. While reviewing stakeholder input, the project manager would like to formally document the needs of the various stakeholders and the associated organizational compliance objectives supported by the project. Which of the following would be MOST appropriate to use?
A. Roles Matrix
B. Peer review
C. BIA
D. SRTM
D. SRTM
A systems administrator has deployed the latest patches for Windows-based machines. However, the users on the network are experiencing exploits from various threat actors, which the patches should have corrected. Which of the following is the MOST likely scenario?
A. The machines were infected with malware
B. The users did not reboot the computer after the patches were deployed
C. The systems administrator used invalid credentials to deploy the patches
D. The patches were deployed on non-Windows-based machines
C. The systems administrator used invalid credentials to deploy the patches
A development team is testing an in-house-developed application for bugs. During the test, the application crashes several times due to null pointer exceptions. Which of the following tools, if integrated into an IDE during coding, would identify these bugs routinely?
- Issue tracker
- Static code analyzer
- Source code repository
- Fuzzing utility
- Fuzzing utility
An engineer is reviewing the security architecture for an enterprise network. During the review, the engineer notices an undocumented node on the network. Which of the following approaches can be utilized to determine how this node operates? (Select TWO).
A. Use reverse engineering tools and techniques
B. Assess the node within a continuous integration environment
C. Employ a static code analyzer
D. Review network and traffic logs
E. Use a penetration testing framework to analyze the node
F. Analyze the output of a ping sweep
D. Review network and traffic logs
E. Use a penetration testing framework to analyze the node
A Chief Information Security Officer (CISO) is reviewing technical documentation from various regional offices and notices some key differences between these groups. The CISO has not discovered any governance documentation. The CISO creates the following chart to visualize the differences among the networking used:
Which of the following would be the CISO’s MOST immediate concern?
A. There are open standards in use on the network
B. Network engineers have ignored defacto standards
C. Network engineers are not following SOPs
D. The network has compelling standards in use
B. Network engineers have ignored defacto standards
Following a recent outage, a systems administrator is conducting a study to determine a suitable bench stock of server hard drives. Which of the following metrics is MOST valuable to the administrator in determining how many hard drives to keep on hand?
A. TTR B. ALE C. MTBF D. SLE E. RPO
B. ALE
- The information security manager of an e-commerce company receives an alert over the weekend that all the servers in a datacenter have gone offline. Upon discussing this situation with the facilities manager, the information security manager learns there was planned electrical maintenance. The information security manager is upset at not being of the maintenance planning, as this could have resulted in a loss of:
A. Data confidentiality
B. Data security
C. PCI compliance
D. Business availability
D. Business availability
A security appliance vendor is reviewing an RFP that is requesting solutions for the defense of a set of web-based applications. This RFP is from a financial institution with very strict performance requirements. The vendor would like to respond with its solutions. Before responding, which of the following factors is MOST likely to have an adverse effect on the vendor’s qualifications?
A. The solution employs threat information-sharing capabilities using a proprietary data model
B. The RFP is issued by a financial institution that is headquartered outside of the vendor’s own country.
C. The overall solution proposed by the vendor comes in less than the TCO parameter in the RFP
D. The vendor’s proposed solution operates below the KPP’s indicated in the RFP
D. The vendor’s proposed solution operates below the KPP’s indicated in the RFP
A security engineer is looking at a DNS server following a known incident. The engineer sees the following command as the most recent entry In the server’s shell history: dd if=dev/sda of=/dec/sdb Which of the following MOST likely occurred?
A. A tap backup of the server was performed
B. The drive was cloned for forensics analysis
C. The hard drive was formatted after the incident
D. The DNS log files were rolled daily as expected
B. The drive was cloned for forensics analysis