CASP Flashcards
Which of the following encryption methodologies should be implemented in an environment where all users need access to bulk storage, but not all users have authorized access to each individual database entry?
Row-level encryption
A security bulletin describes a vulnerability in a common blogging platform due to XML HTTP Request (XHR) processing of state information. Which of the following technologies would this be a part of?
CSS
An organization is developing a new web application that can provide the ability for customers to retrieve fast quotes on products and services. After going live with the web application, the organization is seeing system outages and delays in presenting quotes to customers. Further investigation reveals the logs are seeing SQL queries with $username = ‘1’ or ‘1’ = ‘1’ that give results. Which of the following could prevent this query from being successful?
Stored procedures
An information systems manager has been asked to manage the consolidation of two merging companies’ IT infrastructures. As part of the project the manager will need to evaluate the impact of regulatory requirements relating to storage of data in data centers. Which of the following is a regulatory consideration the manager should evaluate?
Geographical location of data centers
An online gaming company receives two DoS attacks per year. Losses are estimated to be $200,000 per
incident. Executives have decided to invest $75,000 annually in performance and security services, which
reduced the annual loss by 30 percent. Which of the following is the return on investment?
$45,000
A company is evaluating an investment of $1.5 million in IT infrastructure upgrades. The upgrades will take
three years to be fully implemented but will be 80% implemented within 60 days. The remaining upgrades will be completed on an evenly distributed schedule. The board of directors is only willing to make the infrastructure investment if the cost of the upgrades can be recouped within 12 months. It is estimated that for every 10% of the infrastructure that is upgraded, an additional $200,000 in profit will be realized. Which of the following describes the length of time it will take for the investment to be fully paid for?
Less than two months
A security architect has the following requirements for a system:
1. Must be developed with an object-oriented programming language
2. Must encrypt data at rest
3. Must comply with corporate PII policies
4. Must support multi-factor authentication
5. Should be built on a trusted OS
Which of the following contractual documents is the correct place to list these requirements when initially
surveying the vendor space?
RFT
A company is deploying smartphones for the mobile workforce. The devices will be used for personal and
business use, but are owned by the organization. Sales personnel will save new customer data via a custom application developed by the company. This information will integrate with the phones’ contact information application storage and populate new records into it. The custom application’s data is encrypted at rest and the connection to the back office is considered secure. The Chief Information Security Officer (CISO) has concerns that the customer contact information might accidentally leak due to the devices’ limited security capabilities and controls planned. What is the MOST effective security control to implement to lower the risk?
Restrict contact information storage data-flow so that it is only shared with the custom application
A vulnerability scanner report shows that a client-server host monitoring solution operating in the credit card corporate environment is managing SSL sessions with a weak algorithm which does not meet corporate policy. Which of the following are true statements? (Select TWO).
The client-server handshake could not negotiate strong ciphers.
The client-server handshake is configured with a wrong priority.
A security manager has received the following email from the disaster recover project manager:
During part of the recent COOP exercise, I determined that we do not have sufficient network performance at
our hot site to support production-level operations. We found that if we scaled down the sensitivity on the WAF, we achieved the requisite level of performance required to support the productivity needs of the organization. Based on the information provided, which of the following would be the MOST appropriate response to this inquiry from the project manager?
If the current configuration at the primary site is working correctly, there may be other issues at the hot site.
An organization is in the process of implementing a SaaS customer relationship system for its bankers. The
SaaS provider supports standards-based authentication integration mechanisms. There are a number of requirements that need to be met as part of the deployment, including:
- The bankers will not need to enter a password to access the system once logged onto the network.
- The access provisioning process into the SaaS system will be part of the authentication request.
- Authorization to the system will be based on existing groups and permissions.
Which of the following MUST be implemented to meet all the above requirements?
OpenID provider
The security administrator is tasked with finding a security product to replace the current anti-spam system in the company. After reading through NIST documents and the OWASP top ten protection guide, the security administrator is now ready to approach vendors. Which of the following types of research documents should the administrator look for? (Select THREE).
RFI, RFQ and RFP
An IT security architect is defining the technology road map for a company. In particular, the security architect is researching and analyzing industry trends in automated transmission of security content. Which of the following would help to evaluate products in this area?
SCAP
Company A is attempting to acquire competitor Company M. Both companies are publicly traded and must adhere to merger acquisition regulations. The two companies are currently awaiting approval from Company M’s board of directors. During this decision process both companies have new products that are soon to be released. With the news of these impending events, company A’s security team is seeing an increase in whaling attacks targeting senior executives. Which of the following can be used to mitigate the risk?
Follow the communications policy for acquisitions
The company’s communications department is taking photos of employees at multiple locations to showcase
the corporate culture. Some of the pictures include data-center facilities. Which of the following sensitive
information should be removed prior to the posting pictures? (Select TWO).
Employee badges and Geotags
A company is seeking to reduce communications costs by implementing BYOD. The security administrator is
concerned that the existing security acceptable use policies will be ignored or ineffective on users’ personal devices. Corporate data on the personal devices must be protected from theft and should only be accessible through certain applications. The BYOD policy, however, allows users to still utilize devices for personal pictures, videos, or games. Which of the following should the security administrator implement to meet the security goals as well as the BYOD policy?
A managed sandbox
Security architects often have to design systems for environments where different stakeholders have competing requirements. In addition to internal influences and competitors, which of the following often has a major effect on mandatory system design features?
Regulatory entities
Routine review of new releases of content for specifications defined within SCAP can assist organizations in gathering and applying intelligence on which of the following types of information? (Select TWO).
Emerging attacks and Software vulnerabilities
A technician is hardening a host that is going to be used as a web application server. The technician is making several registry setting changes to ensure all security events are being logged for review. Two weeks later, the technician gets a report that users are unable to login to the web server. Analyze the following group policies set by the technician:
-Set maximum security file size to 512KB
-Retain security logs is set to 90 days.
-Retention method for security logs is set to not overwrite events
-Retain application logs is set to 14 days
-Set maximum application log size to 1024KB
-Prevent local guest group from accessing application logs is enabled
Which of the following is causing the users’ inability to login to the web server?
Log file size is too small
A new system that will share sensitive information is in the process of being implemented. Two users have
shared ownership of the sensitive data stored within the system and they are performing separate data
classification exercises. Joe’s data classification matrix is shown below:
RECORD TYPE CONFIDENTIALITY INTEGRITY AVAILABILITY
User health record HIGH HIGH MEDIUM
User address HIGH MEDIUM LOW
Ann’s data classification matrix is also shown below:
RECORD TYPE CONFIDENTIALITY INTEGRITY AVAILABILITY
User department LOW LOW LOW
User budget MEDIUM HIGH MEDIUM
User’s supervisor LOW LOW LOW
Given the above information, which of the following is the appropriate individual sensitivity level with respect to CIA and aggregate CIA score which will be applied to the system storing such data?
Confidentiality=HIGH, Integrity=HIGH, Availability=MEDIUM, Aggregate=HIGH
A security architect is designing a series of technical protect, detect, and respond security capabilities with
significant automation potential. One of the objectives is to ensure tools from various vendors can be
implemented and support standardized data exchange. The architect would like to initially select a solution that
supports automated configuration checklists. Which of the following solutions should be selected?
SCAP
A company has reported several web applications are experiencing errors related to unsecure certificates from the web browser. A security consultant discovers Internet-facing web servers, as well as intranet and internal servers, are configured with 1024-bit key lengths. Which of the following will resolve the web browser errors?
New certificates will need to be issued to support 2048-bit RSA key lengths
After a recent breach, a company discovers a web server could not be updated due to incompatibilities with the local legacy database. The chief information officer has decided to implement a design that allows for easier updating of discrete components of the company’s IT infrastructure. Which of the following principles BEST achieves the CIO’s objective? (Select TWO).
Select products developed by established companies and Leverage protocols from RFC documents
A security architect receives a 42-page document of project specifications from the lead developer. According to corporate policy, the message is sent using the PKI system. While the architect is able to read the document,the digital signature has failed validation. The architect calls the developer to see if the document can be sent again. The developer says this happens all the time and the document is probably fine. Which of the following should the architect be concerned about?
The integrity of the document and non-repudiation of the sender are lost without a valid digital signature.
A security administrator has discovered a user may be sending sensitive data communications to external
parties. Law enforcement is not ready to prosecute the case against the user but has asked the administrator to protect any current and future evidence that may assist in the case. The user must be allowed to continue working until a change is formally issued. Which of the following should the administrator implement to meet these requirements?
Legal hold
An employee from finance was dismissed when it was discovered that the employee had been committing
financial fraud for several years. The most trusted senior manager in finance has been reassigned the duty of performing wire transfers. The Chief Financial Officer (CFO) is asking the Chief Information Security Officer (CISO) to implement stronger controls to secure how the transfers are performed. Which of the following responses should the CISO deliver?
Suggest detective controls and separation of duties and explain why they may be more effective mitigation
strategies.
During a new desktop refresh, all hosts are hardened at the OS level before deployment to comply with policy.
Six months later, the company is audited for compliance to regulations. The audit discovers that 30 percent of
the desktops do not meet regulations because the devices are consistently being changed to override settings that do not meet policy. Which of the following is the BEST solution to correct the issue and prevent future noncompliance?
Implement group policy to enforce configuration settings
A hacker wants to target a local electronics distributor. The hacker goes to the distributor’s website and displays the HTML code on the current page. Within the HTML, the hacker finds a snapshot of the code:
QUANTITY:
The hacker recognizes the vulnerability and modifies the line of HTML code to read:
Which of the following vulnerabilities has the hacker taken advantage of?
Field manipulation
A security architect is evaluating new UTM appliances for a large streaming video provider company. The field
of potential devices has been the three leading products based on a market survey where the main criteria was the total number of endpoints protected. During evaluation the three UTM’s, each was further tested for throughput under normal conditions and attack conditions, amount of latency between attacks and administrative usability (scored from 1 to 5 with 5 being perfect usability). The results of the testing are shown in the table below:
UTM 1 2 3
Normal throughput 1Gbps 5Gbps 1Gbps
Attacked throughput .1Gbps 1Gbps .5Gbps
Latency 50ms 60ms 150ms
Usability 4 2 3
Which of the following three UTM’s should be recommended and why?
UTM 2 because it has the highest throughput in both conditions
During an audit of firewall rules, an auditor noted that there was no way to find out who had allowed port 3389 to be available to the Internet. The auditor gave the company a negative mark on their audit, and requested that within 30 days the company produce a written plan to deal with such items in the future. Given the scenario, which of the following will be MOST effective in securing the firewall?
Implement a detailed change management system.
A security administrator must ensure two-factor authentication is enforced when system administrators log in via SSH to sensitive systems. The company already implements certificate-based authentication on sensitive systems, but a recent audit uncovered some system can log on without the second factor. Which of the following has the security administrator overlooked when implementing certificate-based authentication?
System administrators have the ability to issue self-signed certificates to themselves
A new application written in C++ has been completed in the development environment and has been promoted into the testing environment. To test this application from a security perspective, which of the following activities should occur?
Static code scan
The sales staff wants to use a cloud-based customer relationship (CRM) solution. Customer databases are
highly prized and a closely guarded secret. The information security group is raising concerns about data privacy while reviewing the cloud CRM solution.
The following are critical needs of the sales department:
- Lightweight user interfaces for interaction with CRM
- Minimal learning curves for staff
- Consolidated software updates and feature rollouts
- Accessible from anywhere
To mitigate information security concerns, the following need to be in place:
- Strong authentication
- Encrypted data transfer to/from CRM
- Not publically accessible
Which of the following BEST meets the identified needs?
Use a SaaS CRM solution hosted in a local datacenter, accessed via a HTTPS-enabled interface
While analyzing network traffic, a security engineer discovers that confidential emails were passing between two users who should not have had this information. The two users deny sending confidential emails to each other. Which of the following security practices would allow for non-repudiation and prevent the users from removing emails such as these from their accounts? (Select TWO).
Digital Signature and Legal hold
A penetration test discovers a server that is potentially vulnerable to a specific exploit. If the exploit is
successful, the penetration tester would like to establish a remote administrator session to the server. The server uses a host-based firewall which blocks all incoming connections. Which of the following payloads
should be delivered with the exploit to establish a remote administrator session?
Reverse TCP shell
A security administrator has uncovered an unknown executable file named UNKOWNFILE.EXE on the
company’s web server. Although the executable is not triggering the host-based antivirus system, it appears it
has been loaded into memory and initiated a TCP connection with a remote host. The security administrator uploads the file to a cloud-based antivirus system and reviews the following information:
SAMPLE FILE RESULTS SIMILARITY SCORE (%)
UNKOWNFILE.EXE TROJ.GEN.39133 90%
Which of the following findings should the security administrator include in the web server security report based in the above information? (Select TWO).
The sample binary code is a variant of TROJ.GEN.39133
Fuzzy hashing analysis was used to determine if the sample was malware
The network administrator at an enterprise reported a large data leak. One compromised server was used to
aggregate data from several critical application servers and sent it out to the Internet using HTTPS. Upon
investigation,there have been no user logins over the previous week and the endpoint protection software is not reporting any issues. Which of the following BEST provides insight into where the compromised server
collected the information?
Review the flow data against each server’s baseline communications profile
A company has recently discovered the integrity of its data was compromised 7 days ago. The logs indicate the changes were occurring from an account with privileged access. Further analysis has determined the account is associated with a former employee who left 4 weeks ago. Which of the following could have prevented this compromise?
Deprovisioning process
An organization is in the process of reviewing its DRP to ensure that critical systems are identified and to
determine the maximum amount of time those systems can be down. Which of the following will the business need to perform?
Business impact analysis
The lead software developer wishes to distribute a company’s application along with MD5 hashes of the files. The security administrator argues that this method of distribution is not sufficient, and the software should be digitally signed. Which of the following further explains the security administrator’s argument?
While the MD5 hash ensures the integrity of the files, it does not ensure authentication or non-repudiation.
A network engineer wants to deploy user-based authentication across the company’s wired and wireless infrastructure at layer 2 of the OSI model. Company policies require that users be centrally managed and authenticated and that each user’s network access be controlled based on the user’s role within the company. Additionally, the central authentication system must support hierarchical trust and the ability to natively authenticate mobile devices and workstations. Which of the following are needed to implement these requirements? (Select TWO).
LDAP
RADIUS
A public utility company has recently seen an increase in spear phishing attacks that have occurred against
targeted employees. The company is relatively small and users manual processes to monitor such attacks. The company then receives a report that the public website has been defaced with hacktivist comments. The company cannot isolate the server, as certain components are used to process payments via the public website, but quickly remediates the defacement. Which of the following MOST likely occurred in addition to the defacement?
Payment card information was stolen.