CASP Flashcards
Company ABCs SAN is nearing capacity and will cause costly downtime if servers run out of disk space. What is a more cost effective alternative to buying a new SAN?
Enable deduplication on the storage pools.
A system administrator establishes a CIFS share on a UNIX device to share data to Windows systems. The security authentication on the windows domain is set to the highest level. Window domain users are stating that they cannot authenticate to the UNIX share. Which settings on the UNIX server would correct this problem?
Refuse LM and only accept NTLMv2.
Two universities are making their 802.11n wireless networks available to the other university students. The infrastructure will pass the students credentials back the home school for authentication via the internet. Requirements are no passwords should be sent unencrypted, authentication must be delegated to the home school, design should not limit connect speeds and mutual authentication of clients and authentication server. WPA2 Enterprise using EAP-PEAP-MSCHAPv2 will be used for wireless security. Radius proxy servers will be used to forward authentication requests to the home school. The Radius server will have certifications from a common public certificate authority. A strong shared secret key will be used for RADIUS server authentication. What additional security consideration should be added to the design?
Transport layer between the RADIUS servers should be secured.
A large organization has recently suffered a massive credit card breach. During the months of incident response there were multiple attempts to assign blame for whose fault it was that the incident occurred. In which part of the incident response phase would this be addressed in a controlled and productive manner?
During the lessons learned phase.
Three companies want to allow their employees to seamlessly connect to each others wireless corporate networks while keeping one consistent wireless client configuration. Each company wants to maintain its own authentication infrastructure and wants to ensure that an employee who is visiting the other two companies is authenticated by the home office when connecting to the other companies wireless networks. All three companies have agreed to standardize on 802.1v EAP-PEAP-MSCHAP for client configuration. What should the also be implemented in this situation?
The three companies should agree on a single SSID and a hierarchical RADIUS system which implements trust delegation.
A university requires a significant increase in web and database server resources for one week, twice a year, to handle student registration. The web servers remain idle for the rest of the year. What is the most cost effective way for the university to securely handle student registration?
Move the web server to an elastic public cloud while keeping the database server local.
A security administrator wants to prevent sensitive data residing on corporate laptops and desktops from leaking outside of the corporate network. The company has already implemented full-disk encryption and has disabled all peripheral devices on its desktops and laptops. What additional controls must be implemented to minimize the risk of data leakage?
- A DLP gateway should be installed at the company border
2. Full tunnel VPN should be required for all network communication
The Risk Manager has requested a security solution that is centrally managed, can easily be updated and protects end users work stations from both known and unknown malicious attacks when connected to either office or home network. What would be meet this requirement?
HIPS
A source workstation image for new accounting PCs has begun blue-screening. A technician notices that the date/time stamp of the image source appears to have changed. The desktop support director has asked the Information Security department to determine if any changes were made to the source image. What methods would best help with this process?
- Retrieve source system image from backup and run file comparison analysis on the two images.
- Calculate a new hash and compare it with the previously captured image hash.
A security administrator notices a recent increase in workstations becoming compromised by malware. Often the malware is delivered via drive-by and is not being detected by the corporate antivirus. Which solutions would BEST provide the protection for the company?
Deploy a cloud based content filter and enable the appropriate category to prevent further infections.
A security consultant is conducting a network assessment and wishes to discover any legacy backup internet connections the network may have. Where would the consultant find this information and why would it be valuable?
This information can be found in global routing tables because backup connections typically do not have perimeter protection as strong as the primary connection.
Helpdesk department desires to roll out a remote support application for internal use on all company computers. This tool should allow remote desktop sharing, system log gathering, chat, hardware logging, inventory management, and remote registry access. The risk management team has been asked to review vendor responses to the RFQ. Which of the following is MOST important?
What accountability is built into the remote support application.
The helpdesk manager wants to find a solution that will enable the helpdesk staff to better serve company employees who call for computer related problems. The helpdesk staff is currently unable to perform effective troubleshooting and relies on callers to describe their technology problems. Given that the helpdesk staff is located within the company headquarters and 90% of the callers are telecommuters, which of the following tools should the helpdesk manager use to make the staff more effective at troubleshooting while at the same time reducing company costs?
Instant messaging and Desktop sharing.
A new internal network segmentation solution will be implemented into the enterprise that consists of 200 internal firewalls. As part of a running pilot exercise, it was determined that it takes three changes to deploy a new application onto the network before it is operational. Security not has a significant effect on overall availability. Which of the following would be the FIRST process to perform as a result of these findings?
Review to determine if control effectiveness is in line with the complexity of the solution. Determine if the requirements can be met with a simpler solution.
A company is in the process of implementing a new front end user interface for its customers, the goal is to provide them with more self service functionality. The application has been written by developers over the last six months and the project is currently in the test phase. Which of the following security activities should be implemented as part of the SDL in order to provide the most security coverage over the solution.
- Perform grey box penetration testing over the solution.
2. Perform static code review over the front end source code.
Security analyst has been asked to develop a quantitive risk analysis and risk assessment for the company’s online shopping application. Based on heuristic information from the Security Operations Center, a Denial of Service attack has been successfully executed 5 times a year. The Business Operations Department has determined the loss associated to each attack is $40000. After implementing application caching the number of DoS attacks was reduced to one time a year. What is the monetary value earned during the first year of operation.
$60000
At 9:00 am each morning all the virtual desktops in a VDI implementation become extremely slow and/or unresponsive. The outage lasts for 10 minutes after which every thing runs properly again. The administrator has traced the problem to a lab of thin clients that are all booted at 9:00 am each morning. What is the most likely cause of the problem and the BEST solution to fit it.
Booting all the lab desktops at the same time is creating excessive I/O.
Install a faster SSD drives in the storage system used in the infrastructure.
In order to reduce the costs and improve employee satisfaction, a large corporation is creating a BYOD policy. It will allow access to email and remote connections to the corporate enterprise from personal devices, provided they are on an approved list. What security measure is will be the MOST effective in securing the enterprise under the new policy?
- Encrypt data in transit for remote access.
2. Implement NAC to limit insecure device access.
There have been some failures of the company’s internal facing website. A security engineer has found the WAF to be the root cause of the failure. System logs show that the WAF has been unavailable for 14 hours over the past month in four separate situations. One of these situations was a two hour scheduled maintenance time aimed at improving the stability of the WAF. Using the MTTR based on the last months performance figures, which of the following calculations is the percentage of uptime assuming there were 722 hours in a month?
98.34 percent.
A system administrator needs to meet the maximum amount of security goals for a new DNS infrastructure. The administrator deploys DNSSEC extensions to the domain names and infrastructure. Which of the following security goals does this meet?
Authentication and Integrity.
A security administrator wants to deploy a dedicated storage solution which is inexpensive, can natively integrate with AD, allow files to be selectively encrypted and is suitable for a small number of users at a satellite office. What would be the BEST meet this requirement?
NAS
The Chief Information Officer is reviewing the IT centric BIA and RA documentation. The document shows that a single 24 hours downtime in a critical business function will cost the business $2.3 million. Additionally, the business unit which depends on the critical business function has determined that there is a high probably that a threat will materialize based on historical data. The CIOs budget does not allow for full system hardware replacement in case of catastrophic failure nor does it allow for purchase of additional compensating controls. What should the CIO recommend to the finance director to minimize loss.
Company should transfer the risk.
The Human Resource manager at a software development company has been tasked with recruiting personnel for a new cyber defensive division at the company. This division will require personnel to have high technology skills and industry certifications. Which is the best method for this manager to gain insight into this industry to execute the task?
Attend conferences, webinars and training to remain current with the industry and job requirements.
The Chief Executive Officer of a company that allows telecommuting has challenged the Chief Security Officer request to hardened the corporation’s network perimeter. The CEO argues that the company cannot protect its employee at home so the risk at work is no different. Which of the following BEST explains why the company should proceed with protecting its corporate boundary?
The aggregation of employees a corporate network makes it more valuable target for attackers.
A popular commercial virtualization platform allows for the creation of virtual hardware. By implementing virtualized TPMs which of the following trusted systems concepts can be implemented?
Chain of trust with a hardware root of trust.
A security manager received the following email from the Chief Financial Officer “While I am concerned about the security of the proprietary financial data in our ERP application, we have had a lot of turnover in the accounting group and I am having a difficult time meeting our monthly performance targets. As things currently stand we do not allow employees to work from home but this is something I am willing to allow so we can get back on track. What should we do first to securely enable this capability for my group? Based on the information provided what is the most appropriate response to the CEO?
Work with the executive management team to revise policies before allowing any remote access.
A Penetration tester is accessing a mobile bank application. Man-in-the-middle attack via a HTTP intercepting proxy are failing with SSL errors. Which of the following controls has likely been implemented by the developer?
SSL certificate pinning.
Company XYZ provides hosting services for hundreds of companies across multiple industries including healthcare education and manufacturing. The security architect for company XYZ is reviewing a vendor’s proposal to reduce the company’s hardware cost by combining multiple physical hosts through the use of virtualization technologies. The security architect notes concern about data separation confidentiality regulatory requirements concerning PII and administrative complexity on the proposal. Which BEST describes the core concerns of the security architect?
Company XYZ could be liable for disclosure of sensitive data from one hosted customer when accessed by a malicious user who has gained access to the virtual machine of another hosted customer.
Company A needs to export sensitive data from its financial system to Company’s B database using company’s Bs API in an automated manner. Company A’s policy prohibits the use of any intermediary external system to transfer or store its sensitive data therefore the transfer must occur directly between company’s A legacy financial system and company B’s destination server using the supplied API. Additional company A’s legacy financial software does not support encryption while company B API supports encryption. Which of the following will support end to end encryption for the data transfer while adhering to these requirements?
Company A must install an SSL tunneling software on the finance system.
Member of the software development team has requested advice from the security team to implement a new secure lab for testing malware. Which of the following is the net step that the security team should take?
Create a proposal and present it to management for approval.
A developer is determining the best way to improve security within the code being developed. The developer is focusing on input fields where customers enter their credit card details. Which of the following techniques, if implemented in the code would be the most effective in protecting the fields from malformed input?
Regular expression matching.
An organization would like to allow employees to use their network username and password to access third party service. The company is using Active Directory Federated Services for their directory service. Which of the following should the company ensure is supported by the third party?
SAML and Kerberos
Which of the following activities is deemed Out of Scope when undertaking a penetration test?
Undertaking network based denial of service attacks in production environment.
An organization has decided to reduce labor costs by outsourcing back office processing of credit applications to a provider located in another country. Data sovereignty and privacy concerns raised by the security team resulted in the data via remote desktops sessions. To facilitate communications and improve productivity staff the third party company has been provided with corporate email accounts that are only accessible via remote desktop sessions. Email forwarding is blocked and staff at the third part can only communicate with staff within the organization. What additional controls should be implemented to prevent data loss?
- Disable cross session cut and paste.
2. Source IP white listing.
CEO of a large prestigious enterprise has decided to reduce business cost by out sourcing to a third party company in another country. Functions to be outsourced include business analysts, testing, software development and back office functions that deal with the processing of customer data. The CRO is concerned about the outsourcing plans. Which of the following risks are MOST likely to occur if adequate controls are not implemented?
Improper handling of customer data, loss of intellectual property and reputation damage.
Application present on the majority of an organizations 1000 systems is vulnerable to buffer overflow attack. What is the most comprehensive way to resolve the issue?
Validate and deploy the appropriate patch.
An intruder was recently discovered inside the data center, a highly sensitive area. To gain access the intruder circumvented numerous layers of physical and electronic security measures. Company leadership has asked for a through review of physical security controls to prevent this from happening again. Which of the following departments are most heavily invested in rectifying the problem?
Facilities Management
Data Center Operations
Information Technology
After being notified of an issue with the online shopping cart where customers are able by to arbitrarily change the price of listed items a programmer analyzes the following piece of code used by the web based shopping cart:
SELECT ITEM CART WHERE ITEM=ADDSLASHES($userinput$)
The programmer found that every time a user adds an item to the cart, a temporary file is created on the web server /tmp directory. The temp file has a name which is generated by canating the content of $userinput$ variable and a timestamp in the form of MM-DD-YY containing the price of the item being purchased. Which of the following is most likely being exploited to manipulate the price of a shopping carts item?
TOC/TOU
A security firm is writing a response to an RFP from a customer that is building a new network based software product. The firms expertise is in penetration testing corporate networks. The RFP explicitly calls for all possible behaviors of the product to be tested, however it does not specify any particular method to achieve this goal. What should be used to ensure the security and functionality of the product?
Code Review
White box testing
An organization is concerned with the possible data loss in the event of a disaster and created a backup data center as a mitigation strategy. The current storage method is a single NAS used by all servers in both datacenters. Which of the following options increases data availability in the event of a datacenter failure?
Establish a SAN that replicates between datacenters.
Due to compliance regulations, a company requires a yearly penetration test. The Chief Information Security Officer has asked that it be done under a Black Box methodology. Which of the following would be the advantage of conducting this kind of penetration test?
The results should reflect what attackers may be able to learn about the company.
A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition to the normal compliment of security controls the security architect needs to implement a mechanism to securely store cryptographic keys used to sign code and code modules on the VMS. Which of the following will meet this goal without requiring any hardware pass through implementations?
vTPM
Due to a new regulatory requirement ABC company must now encrypt all WAN transmissions. When speaking with the network administrator the security administrator learns that the existing routers have the minimum processing power to do the required level of encryption. Which of the following solutions minimizes the performance impact on the router?
Deploy inline network encryption devices.
An extensible commercial software system upgraded t the next minor release version to patch a security vulnerability. After the upgrade an unauthorized intrusion into the system is detected. The software vendor is called to troubleshoot the issue and reports that all the components were updated properly. Which of the following has been overlooked?
- The company’s custom code was not patched.
2. Third party plug-ins were not patched.
Security administrator was doing a packet capture and noticed a system communicating with an unauthorized address within the 2001:/32 prefix. The network administrator confirms there is no IPv6 routing into or out of the network. Which of the following is the best course of action?
Investigate the network traffic and block UDP port 3544 at the firewall.
Anna, a system engineer, is working to identify an unknown node in the corporate network. To begin her
investigative work she runs the following nmap command string:
user@hostname:~$sudu nmap 0 192.168.1.54
Based on the output nmap is unable to identify the os running on the node, but the following ports are open on the device: TCP/22, TCP/111, TCP/512-514, TCP/2049, TCP/32778 Based on this information which of the following operating systems is MOST likely running on the unknown node?
Solaris
Company XYZ has purchased and is now developing a new HTMLS application. The company wants to hire a penetration tester to evaluate the security of the client and server components of the proprietary web application before launch. Which of the following is the penetration tester most likely to use while performing black box testing of the security of the company’s purchased application
Local proxy
Fuzzer
The technology steering committee is struggling with increased requirements stemming from an increase in telecommuting. The organization has not addressed telecommuting in the past. The implementation of a new SSL VPN and a Voip phone solution enables a person to work from remote locations with corporate assets. Which of the following steps must the committee take first to outline senior management directives?
Publish a policy that addresses the security requirements for working remotely with corporate equipment.
A network administrator with a company SNSP has received a CERT alert for targeted adversarial behavior at the company. In addition to the company’s physical security which of the following can the network administrator used to detect the presence of a malicious actor physically accessing the company’s network or information systems from within?
HIDS
Protocol Analyzer
An attacker attempts to create a DoS event against the Voip system of a company. The attacker uses a tool to flood the network with a large number of SIP invite traffic. Which of the following would be least likely to thwart such an attack?
Implement QoS parameters on the switches.
A forensic analyst works for an ediscovery firm where several gigabytes of data are processed daily. While the business is lucrative they do not have the resources or the scalability to adequately serve their clients. Since it is an ediscovery firm where chain of custody is important which of the following scenarios should they consider?
Using a community cloud with adequate controls.
An analyst connects to a company’s web conference hosted on www.webconference.com/meeting id#01234 and observers that numerous guests have been allowed to join without providing identifying information. The topics covered during the web conference are considered proprietary to the company. Which of the following security concerns does the analyst present to management?
Unauthorized users could present a risk to the confidentiality of the company’s information.
Security administrator is tasked with implementing two factor authentication for the company’s VPN. VPN is currently configured authenticate VPN users against a backend RADIUS server. New company policies requires a second factor of authentication and the Information Security Officer has selected PKI as the second factor. Which of the following should the security administrator configure and implement on the VPN concentrator to implement the second factor and ensure that no error messages are displayed to the user during the VPN connection?
The VPN concentrators certificate private key must be installed on the VPN concentrator.
The CA’s certificate public key must be installed on the VPN concentrator.
An analyst connects to a company web conference hosted on www.webconference.com/meetingID#01234 and observes that numerous guests have
been allowed to join, without providing identifying information. The topics covered during the web conference are considered proprietary to the company. Which of the following security concerns does the analyst present to management?
Unauthenticated users could present a risk to the confidentiality of the company’s information.
A web services company is planning a one-time high-profile event to be hosted on the corporate website. An outage, due to an attack, would be publicly embarrassing, so Joe, the Chief Executive Officer (CEO), has requested that his security engineers put temporary
preventive controls in place. Which of the following would MOST appropriately address Joe’s concerns?
Contract and configure scrubbing services with third-party DDoS mitigation providers.
The security engineer receives an incident ticket from the helpdesk stating that DNS lookup requests are no longer working from the office. The network team has ensured that Layer 2 and Layer 3 connectivity are working. Which of the following tools would a security
engineer use to make sure the DNS server is listening on port 53?
NMAP
The Information Security Officer (ISO) is reviewing a summary of the findings from the last COOP tabletop exercise. The Chief Information Officer (CIO) wants to determine which additional controls must be implemented to reduce the risk of an extended customer
service outage due to the VoIP system being unavailable. Which of the following BEST describes the scenario presented and the document the ISO is reviewing?
The ISO is assessing the effect of a simulated downtime involving the telecommunication system within the AAR.
The Information Security Officer (ISO) believes that the company has been targeted by cybercriminals and it is under a cyber attack. Internal services that are normally available to the public via the Internet are inaccessible, and employees in the office are unable to browse the Internet. The senior security engineer starts by reviewing the bandwidth at the border router, and notices that the incoming bandwidth on the routers external interface is
maxed out. The security engineer then inspects the following piece of log to try and determine the reason for the downtime, focusing on the companys external routers IP which is 128.20.176.19: 11:16:22.110343 IP 90.237.31.27.19 > 128.20.176.19.19:
UDP, length 1400 11:16:22.110351 IP 23.27.112.200.19 > 128.20.176.19.19: UDP, length 1400
11:16:22.110358 IP 192.200.132.213.19 > 128.20.176.19.19: UDP, length 1400 11:16:22.110402 IP 70.192.2.55.19 > 128.20.176.19.19: UDP, length 1400
11:16:22.110406 IP 112.201.7.39.19 > 128.20.176.19.19: UDP, length 1400
Which of the following describes the findings the senior security engineer should report to the ISO and the BEST solution for service restoration?
After the senior engineer used a network analyzer to identify an active Fraggle attack, the companys ISP should be contacted and instructed to block the malicious packets.
The security administrator finds unauthorized tables and records, which were not present before, on a Linux database server. The database server communicates only with one web server, which connects to the database server via an account with SELECT only privileges. Web server logs show the following:
90.76.165.40 - [08/Mar/2014:10:54:04] GET calendar.php?create%20table%20hidden HTTP/1.1 200 5724
90.76.165.40 - [08/Mar/2014:10:54:05] GET ../../../root/.bash_history HTTP/1.1 200
5724 90.76.165.40 - [08/Mar/2014:10:54:04] GET index.php?user=Create
HTTP/1.1 200 5724
The security administrator also inspects the following file system locations on the database
server using the command ls -al /root
drwxrwxrwx 11 root root 4096 Sep 28 22:45 .
drwxr-xr-x 25 root root 4096 Mar 8 09:30 ..
-rws—— 25 root root 4096 Mar 8 09:30 .bash_history
-rw——- 25 root root 4096 Mar 8 09:30 .bash_history
-rw——- 25 root root 4096 Mar 8 09:30 .profile
-rw——- 25 root root 4096 Mar 8 09:30 .ssh
Which of the following attacks was used to compromise the database server and what can the security administrator implement to detect such attacks in the future? (Select TWO).
Privilege escalation
Update crontab with: find / ( -perm -4000 ) –type f –print0 | xargs -0 ls –l | email.sh
Which of the following provides the BEST risk calculation methodology?
Potential Loss x Event Probability x Control Failure Probability
The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly
flat, with split staff/guest wireless functionality. Which of the following equipment MUST be deployed to guard against unknown threats?
Behavior based IPS with a communication link to a cloud based vulnerability and threat feed.
Joe, a hacker, has discovered he can specifically craft a webpage that when viewed in a browser crashes the browser and then allows him to gain remote code execution in the context of the victims privilege level. The browser crashes due to an exception error when
a heap memory that is unused is accessed. Which of the following BEST describes the application issue?
Use after free
A security engineer on a large enterprise network needs to schedule maintenance within a fixed window of time. A total outage period of four hours is permitted for servers. Workstations can undergo maintenance from 8:00 pm to 6:00 am daily. Which of the following can specify parameters for the maintenance work? (Select TWO).
Memorandum of understanding
Operating level agreement
A security engineer is responsible for monitoring company applications for known vulnerabilities. Which of the following is a way to stay current on exploits and information security news?
Subscribe to security mailing lists
A security engineer is working on a large software development project. As part of the design of the project, various stakeholder requirements were gathered and decomposed to an implementable and testable level. Various security requirements were also documented. Organize the following security requirements into the correct hierarchy required for an
SRTM.
Requirement 1: The system shall provide confidentiality for data in transit and data at rest.
Requirement 2: The system shall use SSL, SSH, or SCP for all data transport.
Requirement 3: The system shall implement a file-level encryption scheme.
Requirement 4: The system shall provide integrity for all data at rest.
Requirement 5: The system shall perform CRC checks on all files.
Level 1: Requirements 1 and 4;
Level 2: Requirements 2 and 3 under 1,
Requirement 5 under 4
An organization is selecting a SaaS provider to replace its legacy, in house Customer Resource Management (CRM) application. Which of the following ensures the organization mitigates the risk of managing separate user credentials?
Ensure the SaaS provider supports directory services federation.
A company has received the contract to begin developing a new suite of software tools to replace an aging collaboration solution. The original collaboration solution has been in place for nine years, contains over a million lines of code, and took over two years to
develop originally. The SDLC has been broken up into eight primary stages, with each stage requiring an in-depth risk analysis before moving on to the next phase. Which of the following software development methods is MOST applicable?
Waterfall model
A security officer is leading a lessons learned meeting. Which of the following should be components of that meeting? (Select TWO).
Discussion of event timeline
Assigning of follow up items
A company is in the process of outsourcing its customer relationship management system to a cloud provider. It will host the entire organizations customer database. The database will be accessed by both the companys users and its customers. The procurement
department has asked what security activities must be performed for the deal to proceed. Which of the following are the MOST appropriate security activities to be performed as part of due diligence? (Select TWO).
Security clauses are implemented into the contract such as the right to audit.
Review of the organizations security policies, procedures and relevant hosting certifications.
Which of the following describes a risk and mitigation associated with cloud data storage?
Risk: Shared hardware caused data leakage Mitigation: Strong encryption at rest
An industry organization has implemented a system to allow trusted authentication between all of its partners. The system consists of a web of trusted RADIUS servers
communicating over the Internet. An attacker was able to set up a malicious server and conduct a successful man-in-the-middle attack. Which of the following controls should be implemented to mitigate the attack in the future?
Enforce TLS connections between RADIUS servers
The risk manager is reviewing a report which identifies a requirement to keep a business critical legacy system operational for the next two years. The legacy system is out of support because the vendor and security patches are no longer released. Additionally, this is a proprietary embedded system and little is documented and known about it. Which of the following should the Information Technology department implement to reduce the
security risk from a compromise of this system?
Segment the device on its own secure network.
A large hospital has implemented BYOD to allow doctors and specialists the ability to access patient medical records on their tablets. The doctors and specialists access patient records over the hospitals guest WiFi network which is isolated from the internal network
with appropriate security controls. The patient records management system can be accessed from the guest network and requires two factor authentication. Using a remote desktop type interface, the doctors and specialists can interact with the hospitals system.
Cut and paste and printing functions are disabled to prevent the copying of data to BYOD devices. Which of the following are of MOST concern? (Select TWO).
Privacy could be compromised as patient records can be viewed in uncontrolled areas.
Malware may be on BYOD devices which can extract data via key logging and screen scrapes.
Ann, a software developer, wants to publish her newly developed software to an online store. Ann wants to ensure that the software will not be modified by a third party or end users before being installed on mobile devices. Which of the following should Ann implement to stop modified copies of her software from running on mobile devices?
Remote attestation
Which of the following BEST constitutes the basis for protecting VMs from attacks from other VMs hosted on the same physical platform?
Aggressive patch management on the host and guest OSs.
A developer has implemented a piece of client-side JavaScript code to sanitize a users provided input to a web page login screen. The code ensures that only the upper case and lower case letters are entered in the username field, and that only a 6-digit PIN is entered
in the password field. A security administrator is concerned with the following web server log:
10.235.62.11 - [02/Mar/2014:06:13:04] GET/site/script.php?user=admin&pass=pass%20or%201=1 HTTP/1.1 200 5724
Given this log, which of the following is the security administrator concerned with and which fix should be implemented by the developer?
The security administrator is concerned with SQL injection, and the developer should implement server side input validation.
An assessor identifies automated methods for identifying security control compliance through validating sensors at the endpoint and at Tier 2. Which of the following practices satisfy continuous monitoring of authorized information systems?
Ongoing authorization