CASP Practice Test Flashcards
Which of the following is known as a ROT 3 cipher?
A. Caesar
B. Scytale
C. DES
D. AES
A. Caesar
Caesar cipher is an early form of encryption and is also known as a ROT3 cipher.
Which of the following is not one of the four common goals of cryptography?
A. Privacy
B. Authentication
C. Availability
D. Integrity
C. Availability
The four common goals of cryptography include privacy, authentication, integrity, and non-repudiation.
The act of obtaining plain text from cipher text without a cryptographic key is known as what?
A. Encryption
B. Cryptanalysis
C. Hashing
D. Integrity verification
B. Cryptanalysis
Cryptanalysis is the act of obtaining plain text from cipher text without a cryptographic key.
______ is a measure of the randomness of data collected by an application or even an operating system and used to create a cryptography key
A. Encryption
B. Hashing
C. Entropy
D. Confusion
C. Entropy
While key size is important, the randomness of the key is also critical. Entropy is a measure of the randomness of data collected by an application or even an operating system and used to create a cryptography key
Which of the following is not a symetric algrothim?
A. CAST
B. RC5
C. DES
D. RSA
D. RSA
Example of symmetric encryption techniques include CAST, DES, and RC5. RSA is a asymmetric algorithm
DES does how many rounds during the encryption process?
A. 2
B. 8
C. 16
D. 48
C. 16
DES does 16 rounds of substitution and transposition during the encryption process.
3DES does how many rounds during the encryption process?
A. 2
B. 8
C. 16
D. 48
D. 48
3DES does 48 rounds of substitution and transposition during the encryption process.
Which of the following makes use of a stream cipher process?
A. DES ECB
B. RC4
C. RC5
D. CAST
B. RC4
RC4 is considered a stream cipher whereas DES ECB, RC5, and RC6 are block ciphers.
SAFER uses ___ blocks of data?
A. 8
B. 32
C. 64
D. 256
C. 64
Secure and Fast Encryption Routine is a block-based cipher that processes data in blocks of 64 and 128 bits.
DES has an effective key length of?
A. 32
B. 56
C. 64
D. 256
B. 56
The DES key size is 56- bits, and DES has four primary modes of operation
Cisco first came up with which of the following remote access technology?
A. TACACS
B. RADIUS
C. Diameter
D. XTACACS
A. TACACS
Cisco has implemented a variety of remote access methods through its networking hardware and software. Originally, this was Terminal Access Controller Access Control System (TACACS).
These devices have the ability to perform deep packet inspection and look at requests and responses within the HTTP/HTTPS/SOAP/XML-RPC/Web Service layers.
A. Proxy
B. IDS
C. DMZ
D. WAF
D. WAF
A WAF is a firewall sitting between a web- client and a web server, analyzing OSI Layer-7 traffic.
What is another name for digital controllers?
A. SCADA
B. JK Flip/Flops
C. Cyber systems
D. NAC
A. SCADA
Yesterday’s analog controls have become today’s digital systems. These digital controls are known as Supervisory Control And Data Acquisition (SCADA) systems.
Which of the following doe VoIP not use?
A. IAX
B. H.121
C. SIP
D. RTP
B. H.121
VoIP makes use of protocols such as Session Initiation Protocol (SIP), H.323, Inter-Asterisk eXchange protocol (IAX), and Real-time Transport Protocol (RTP).
HTTP functions at which layer of the TCP model?
A. Application
B. Host-to-host
C. Internet
D. Data link
A. Application
HTTP, and other protocols like Telnet and SNMP, function at the application layer where they provide network services.
What TCP port does SMTP use?
A. 21
B. 23
C. 25
D. 80
C. 25
SMTP uses TCP port 25
What UDP port does TFTP use?
A. 21
B. 69
C. 25
D. 161
B. 69
UDP port 69 is used for TFTP
This protocol is no longer used in IPv6?
A. ICMP
B. TCP
C. ARP
D. DNS
C. ARP
Say goodbye to ARP. While ARP is an integral part of IPv4, it is not used with IPv6. IPV6 makes use of NDP, the neighbor discovery protocol (NDP).
An IPv4 header has a default length of _______________ .
A. 16 bytes
B. 8 bytes
C. 20 bytes
D. 40 bytes
C. 20 bytes
IPv4 has a 20 byte default header length and can be 60 bytes maximum with options.
An ICMP type 8 message is best defined as?
A. Unreachable
B. Ping
C. Redirect
D. Time exceeded
B. Ping
ICMP is used for logical errors and diagnostics. An ICMP type 8 is a ping request.
___________________ describes a cloud solution where you are buying infrastructure
A. IaaS
B. BasF
C. MaaS
D. SaaS
A. IaaS
This approach includes monitoring for networks, application, servers, applications, and remote systems .
A. IaaS
B. BasF
C. MaaS
D. SaaS
C. MaaS
Another name for a confused deputy attack is?
A. XSS
B. DoS
C. Session hijacking
D. Sniffing
A. XSS
This Cisco VLAN technology wraps the Ethernet frame, yet but it is not a standard used by all vendors.
A. ISL
B. QLAN
C. 802.1q
D. STP
A. ISL
This VLAN standard places information inside the Ethernet frame.
A. ISL
B. QLAN
C. 802.1q
D. STP
C. 802.1q
______ is an attack in which an attacker tries to send data to hosts that belong to other VLANs
A. Spanning
B. VLAN hopping
C. Bridging
D. Scanning
B. VLAN hopping
______ is a SAN standard used for connecting data storage facilities and allowing remote SCSI devices to communicate
A. HBA
B. vSCAN
C. FCoE
D. iSCSI
D. iSCSI
______ can operate at speeds of 10 Gigabits gigabits per second and rides on top of the Ethernet protocol.
A. HBA
B. vSCAN
C. FCoE
D. iSCSI
C. FCoE
_______ is implemented primarily at the HBA level.
A. LUN masking
B. vSCAN
C. FCoE
D. iSCSI
A. LUN masking
_________ is the process of removing redundant data to improve enterprise storage utilization.
A. Data scanning
B. Data aggregation
C. Data duplication
D. Data mining
C. Data duplication
What implict command is at the end of every ACL?
A. A default deny all
B. An end statement
C. A default allow all
D. An allow statement
A. A default deny all
Snort can not filter on which of the following traffic types
A. IP
B. TCP
C. UDP
D. OSPF
D. OSPF
Extended ACL’s cannot by default examine which of the following?
A. Protocol
B. IPSEC data
C. DSCP
D. Precedent value
B. IPSEC data
What is wrong with the following ACL?
interface Eth0 deny ip any any
deny tcp 10.10.10.128 0.0.0.63 any eq smtp deny tcp any eq 23 int ethernet 0 ip access-group 110 out
A. Access-group statement
B. Interface Eth0
C. Deny TCP statement
D. Deny all statement
D. Deny all statement
Which model uses the following, “This property states that an object at one level of integrity is not permitted to write to an object of higher integrity.”
A. Bell-LaPadula
B. Biba
C. Clark Wilson
D. Brewer Nash
B. Biba
Which of the following Evaluation Assurance Levels (EAL) matches methodically designed tested, and reviewed?
A. EAL 1
B. EAL 2
C. EAL 3
D. EAL 4
D. EAL 4
Structurally tested is what EAL level?
A. EAL 1
B. EAL 2
C. EAL 3
D. EAL 4
B. EAL 2
ITSEC was designed for use in what region of the world?
A. China
B. Canada
C. Europe
D. USA
D. USA
Which of the following is used of identifying the version of OS running on a computer?
A. Nmap -O
B. Nmap -sS
C. Nmap -sU
D. Nmap –sT
A. Nmap -O