CASP Mark B Mock 1 Flashcards
Developers are building a sensitive references and account details into the application code. Security engineers needs to ensure that the organization can secure the continuous integration/continuous deliver pipeline. What would be the best choice?
A. Perform dynamic application security testing
B. Use a centralized trusted secrets manager service
C. Use interactive application security testing
D. Ensure the developers are using version control
B. Use a centralized trusted secrets manager service
Explanation:
Use a centralized trusted secrets manager service. Secrets can include user or auto generated passwords, APIs, and other application keys/credentials, SSH keys, databases and other system to system passwords. You should use private certificates for more secure communication and private encryption keys
What type of assessment should be performed by an organization that stores, transmits or processes data that contains private information?
A. Business Impact Assessment
B. Privacy Impact Assessment
C. Risk Assessment
D. Safety Assessment
B. Privacy Impact Assessment
Explanation:
Privacy Impact Assessment. A PIA should be undertaken by any organization that stores, transmits or processes data that contains private information. Data types will vary but can include documents, database records and media such as CCTV footage and voice recordings
The ACME corporation has recently run an annual risk assessment as part of its regulatory compliance. The risk management team has identified a high level risk that could lead to fraudulent activities. The team has recommended that certain privileged tasks must be performed by more than one person for the task to be validated. What is this an example of?
A. Job rotation
B. Least privilege
C. Separation of duties
D. MFA
C. Separation of duties
Explanation:
Separation of duties. When an employee has privileges that enable them to make high-level decisions without needing the consent of another employee, then we are missing essential checks and balances. Consider a Chief Financial Officer (CFO), who approves new suppliers, approves the suppliers’ invoices for services, and signs their paychecks. This example would allow for fraudulent activities and would be mitigated by establishing accounts receivable and accounts payable business functions. See Chapter 13, Applying Appropriate Risk Strategies.
Birch, Mark. CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam (p. 820). Packt Publishing. Kindle Edition.
No
An e-commerce site has recently upgraded its web application servers to use TLS 1.3, though some customers are calling the service desk as they can no longer access the services. After analyzing the logs that had been generated on the client’s devices, the following was observed: ERROR_SSL_VERSION_OR_CIPHER_MISMATCH
What is the most likely cause of the reported error?
A. Clients are configured to use ECDHE.
B. Clients are configured to use RC4.
C. Clients are configured to use PFS.
D. Clients are configured to use AES-256 GCM.
Birch, Mark. CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam (pp. 798-799). Packt Publishing. Kindle Edition.
B. Clients are configured to use RC4.
Explanation:
Clients are configured to use RC4. RC4 is considered weak encryption and would not be supported while using TLS 1.3
The security professionals are reviewing all the servers in the company and discover that a server is missing crucial patches that would mitigate a recent exploit that could gain root access. Which of the following describes the teams’ discovery?
A. A vulnerability
B. A threat
C. A breach
D. A risk
Birch, Mark. CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam (p. 799). Packt Publishing. Kindle Edition.
A. A vulnerability
Explanation:
A vulnerability. When a system is missing patches, it is vulnerable to attacks. During a risk assessment, we need to assess vulnerabilities and potential threats that could target the vulnerability. See Chapter 6, Vulnerability Assessment and Penetration Testing Methods and Tools.
Birch, Mark. CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam (pp. 820-821). Packt Publishing. Kindle Edition.
ACME bank has a compliance requirement. They require a third-party penetration test of the customer-facing banking application to be conducted annually. What type of penetration testing would ensure the lowest resource usage?
A. Black-box testing
B. Gray-box testing
C. Red-team exercises
D. White-box testing
Birch, Mark. CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam (p. 799). Packt Publishing. Kindle Edition.
A. Black-box testing
Explanation:
Black box testing will take the least amount of time but may noit discover all vulnerabilities
Recently, the ACME corporation has merged with a similar sized organization. The SOC Staff now have an increased workload and are failing to respond to all alerts. What is likely the cause of this behavior?
A. False positive
B. Alert fatigue
C. False negative
D. True positive
B. Alert fatigue
Explanation:
Alert fatigue. This is when the staff are overwhelmed with too many alerts.
A small regional bank, with no dedicated security, must deploy security at the edge of the network. They will need a solution that will offer protection from multiple threats that may target the banks network. What would be the best solution for this?
A. Router
B. WAF
C. UTM
D. DLP
C. UTM
Explanation:
Unified Threat Management combines multiple security functions into a single appliance
During baseline security training for new developers, attention must be focused on the use of third party libraries. What is the important aspect for a commercial development team that’s considering the use of third party libraries?
A. Third party libraries may have vulnerabilities.
B. Third party libraries may be incompatible
C. Third party libraries may not support DNSSEC
D. Third party libraries may have licensing restrictions
A. Third party libraries may have vulnerabilities.
D. Third party libraries may have licensing restrictions
Explanation:
Third party libraries may have vulnerabilities and third party libraries may have licensing restrictions
A CISO wants to change the culture of the organization to strengthen the companys security posture. The initiative will bring the development and operations team together when code is released to the production environment. What is the best description of this initiative?
A. DevOps
B. A team building exercise
C. A tabletop exercise
D. SecDevOps
D. SecDevOps
Explanation:
The development team and operations team work together to ensure code is delivered error free
A development team is working with a customer to develop a mobile application. The customer has already defined all the requirements upfront and wants the application to be developed using very strict timelines. It is not anticipated that any changes will be made to the initial definition. What software development approach would be the most suitable for this engagement?
A. Agile
B. Waterfall
C. Spiral
D. Build and Fix
B. Waterfall
Explanation: The waterfall methodology means that we must have defined all the requirements at the start of the process and that no changes will be made during the development cycle
A CISO for a large multinational bank would like to address security concerns regarding the use and auditing of local administrator credentials on end devices. Currently, users are given local administrator privileges when access is required. This current practice has resulted in undocumented changes, a lack of accountability, and account lockouts. What could be implemented to address these issues?
A. Use Privileged Access Management (PAM) to maintain user accounts in the local admin group.
B. Deploy EDR to remove users from local admins group and enable audit logs.
C. Use Privileged Access Management (PAM) to remove user accounts from the local admin group and prompt the user for explicit approval when elevation is required.
D. Deploy EDR to remove users from the local admins group and enable UEBA.
Birch, Mark. CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam (pp. 801-802). Packt Publishing. Kindle Edition.
C. Use Privileged Access Management (PAM) to remove user accounts from the local admin group and prompt the user for explicit approval when elevation is required.
Explanation:
Use Privileged Access Management (PAM) to remove user accounts from the local admin group and prompt the user for explicit approval when elevation is required. This solution allows accounts to elevate their privileges and that these actions will be audited
The ACME corporation has been suffering from increasing numbers of service outages on the endpoints due to ever-increasing instances of new malware. The Chief Financial Officer’s laptop was impacted while working remotely from a hotel. The objective is to prevent further instances of endpoint disruption. Currently, the company has deployed a web proxy at the edge of the network. What should the company deploy to mitigate these threats?
A. Replace the current antivirus with an EDR solution.
B. Remove the web proxy and install a UTM appliance.
C. Implement application blacklisting on the endpoints.
D. Add a firewall module to the current antivirus solution.
Birch, Mark. CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam (p. 802). Packt Publishing. Kindle Edition.
A. Replace the current antivirus with an EDR solution.
Explanation:
Replace the current antivirus with an EDR solution. The end devices must be protected when they are not on the company network. The other solutions will not adequately fulfill the requirements
A company has been testing its Disaster Recovery Plan (DRP) while team members have been assessing challenges that had been encountered while testing in parallel. Computing resources ran out at 65% of the restoration process for critical services. What documentation should be modified to address this issue?
A. Recovery point objective
B. Business Impact Assessment
C. Mission-essential functions
D. Recovery service level
Birch, Mark. CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam (pp. 802-803). Packt Publishing. Kindle Edition.
D. Recovery service level
Explanation:
Recovery Service Level
A security professional is performing a system penetration test. They successfully gain access to a shell on a Linux host as a standard user and want to elevate their privilege levels. What would be the most effective way to perform privilege escalation?
A. Spawn a shell using sudo and use a text editor to update the sudoer’s file.
B. Perform ASIC password cracking on the host.
C. Access the /etc/passwd file to extract the usernames.
D. Use the UNION operator to extract the database schema.
Birch, Mark. CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam (p. 803). Packt Publishing. Kindle Edition.
C. Access the /etc/passwd file to extract the usernames.
Explanation:
Access the /etc/passwd file to extract the usernames. As the account is a standard user, they will not have the right to edit configuration files (sudoers), so the best option is to access the passwd file
No
A CISO needs to ensure there is an effective incident response plan. As part of the plan, a CSIRT team needs to be identified, including leadership with a clear reporting and escalation process. At what part of the incident response process should this be done?
A. Preparation
B. Detection
C. Analysis
D. Containment
Birch, Mark. CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam (p. 804). Packt Publishing. Kindle Edition.
A. Preparation
Explanation:
Preparation
The ACME corporation’s CSIRT team responded to an incident where several routers failed at the same time. The cause of the failure is unknown, and the routers have been reconfigured and restored to operational condition. The integrity of the router’s configuration has also been verified. Which of the following should the team perform to understand the failure and prevent it in the future?
A. Root cause analysis
B. Continuity of operations plan
C. After-action report
D. Lessons learned
Birch, Mark. CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam (pp. 804-805). Packt Publishing. Kindle Edition.
A. Root cause analysis
Explanation:
This would be performed as a result of lessons learned/AAR
Jeff, a developer with the ACME corporation, is concerned about the impact of new malware on an ARM CPU. He knows that the malware can insert itself in another process memory location. Which of the following technologies can the developer enable on the ARM architecture to prevent this type of malware?
A. Execute-never (XN)
B. EDR software
C. Total memory encryption
D. Virtual memory encryption
Birch, Mark. CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam (p. 805). Packt Publishing. Kindle Edition.
A. Execute-never (XN)
Explanation:
CPU chips support memory protection within the hardware