CASP Study Deck 5 (Questions 101 - 125) Flashcards

1
Q

A system administrator needs to meet the maximum amount of security goals for a new DNS infrastructure. The administrator deploys DNSSEC extensions to the domain names and infrastructure. Which of the following security goals does this meet? (Select TWO).

A. Availability
B. Authentication
C. Integrity
D. Confidentiality
E. Encryption
A

B. Authentication

C. Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The risk manager is reviewing a report which identifies a requirement to keep a business critical legacy system operational for the next two years. The legacy system is out of support because the vendor and security patches are no longer released. Additionally, this is a proprietary embedded system and little is documented and known about it. Which of the following should the Information
Technology department implement to reduce the security risk from a compromise of this system?

A. Virtualize the system and migrate it to a cloud provider.

B. Segment the device on its own secure network.

C. Install an antivirus and HIDS on the system.

D. Hire developers to reduce vulnerabilities in the code.

A

B. Segment the device on its own secure network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization would like to allow employees to use their network username and password to access a third-party service. The company is using Active Directory Federated Services for their directory service. Which of the following should the company ensure is supported by the thirdparty? (Select TWO).

A. LDAP/S
B. SAML
C. NTLM
D. OAUTH
E. Kerberos
A

B. SAML

E. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An extensible commercial software system was upgraded to the next minor release version to
patch a security vulnerability. After the upgrade, an unauthorized intrusion into the system was detected. The software vendor is called in to troubleshoot the issue and reports that all core components were updated properly. Which of the following has been overlooked in securing the system? (Select TWO).

A. The company’s IDS signatures were not updated.

B. The company’s custom code was not patched.

C. The patch caused the system to revert to http.

D. The software patch was not cryptographically signed.

E. The wrong version of the patch was used.

F. Third-party plug-ins were not patched.

A

B. The company’s custom code was not patched.

F. Third-party plug-ins were not patched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A forensic analyst works for an e-discovery firm where several gigabytes of data are processed daily. While the business is lucrative, they do not have the resources or the scalability to adequately serve their clients. Since it is an e-discovery firm where chain of custody is important,
which of the following scenarios should they consider?

A. Offload some data processing to a public cloud

B. Aligning their client intake with the resources available

C. Using a community cloud with adequate controls

D. Outsourcing the service to a third party cloud provider

A

C. Using a community cloud with adequate controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company is deploying a new iSCSI-based SAN. The requirements are as follows:

  • SAN nodes must authenticate each other.
  • Shared keys must NOT be used.
  • Do NOT use encryption in order to gain performance.

Which of the following design specifications meet all the requirements? (Select TWO).

A. Targets use CHAP authentication
B. IPSec using AH with PKI certificates for authentication
C. Fiber channel should be used with AES
D. Initiators and targets use CHAP authentication
E. Fiber channel over Ethernet should be used
F. IPSec using AH with PSK authentication and 3DES
G. Targets have SCSI IDs for authentication

A

B. IPSec using AH with PKI certificates for authentication

D. Initiators and targets use CHAP authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Company XYZ provides hosting services for hundreds of companies across multiple industries including healthcare, education, and manufacturing. The security architect for company XYZ is reviewing a vendor proposal to reduce company XYZ’s hardware costs by combining multiple physical hosts through the use of virtualization technologies. The security architect notes concerns about data separation, confidentiality, regulatory requirements concerning PII, and administrative complexity on the proposal. Which of the following BEST describes the core concerns of the
security architect?

A. Most of company XYZ’s customers are willing to accept the risks of unauthorized disclosure and
access to information by outside users.

B. The availability requirements in SLAs with each hosted customer would have to be re-written to
account for the transfer of virtual machines between physical platforms for regular maintenance.

C. Company XYZ could be liable for disclosure of sensitive data from one hosted customer when
accessed by a malicious user who has gained access to the virtual machine of another hosted
customer.

D. Not all of company XYZ’s customers require the same level of security and the administrative
complexity of

A

C. Company XYZ could be liable for disclosure of sensitive data from one hosted customer when
accessed by a malicious user who has gained access to the virtual machine of another hosted
customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A university requires a significant increase in web and database server resources for one week, twice a year, to handle student registration. The web servers remain idle for the rest of the year. Which of the following is the MOST cost effective way for the university to securely handle student registration?

A. Virtualize the web servers locally to add capacity during registration.

B. Move the database servers to an elastic private cloud while keeping the web servers local.

C. Move the database servers and web servers to an elastic private cloud.

D. Move the web servers to an elastic public cloud while keeping the database servers local.

A

D. Move the web servers to an elastic public cloud while keeping the database servers local.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Due to a new regulatory requirement, ABC Company must now encrypt all WAN transmissions. When speaking with the network administrator, the security administrator learns that the existing routers have the minimum processing power to do the required level of encryption. Which of the following solutions minimizes the performance impact on the router?

A. Deploy inline network encryption devices

B. Install an SSL acceleration appliance

C. Require all core business applications to use encryption

D. Add an encryption module to the router and configure IPSec

A

A. Deploy inline network encryption devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In order to reduce costs and improve employee satisfaction, a large corporation is creating a BYOD policy. It will allow access to email and remote connections to the corporate enterprise from personal devices; provided they are on an approved device list. Which of the following security measures would be MOST effective in securing the enterprise under the new policy? (Select TWO).

A. Provide free email software for personal devices.
B. Encrypt data in transit for remote access.
C. Require smart card authentication for all devices.
D. Implement NAC to limit insecure devices access.
E. Enable time of day restrictions for personal devices.

A

B. Encrypt data in transit for remote access.

D. Implement NAC to limit insecure devices access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security administrator is tasked with implementing two-factor authentication for the company VPN. The VPN is currently configured to authenticate VPN users against a backend RADIUS server. New company policies require a second factor of authentication, and the Information
Security Officer has selected PKI as the second factor. Which of the following should the security
administrator configure and implement on the VPN concentrator to implement the second factor
and ensure that no error messages are displayed to the user during the VPN connection? (Select TWO).

A. The user’s certificate private key must be installed on the VPN concentrator.

B. The CA’s certificate private key must be installed on the VPN concentrator.

C. The user certificate private key must be signed by the CA.

D. The VPN concentrator’s certificate private key must be signed by the CA and installed on the VPN
concentrator.

E. The VPN concentrator’s certificate private key must be installed on the VPN concentrator.

F. The CA’s certificate public key must be installed on the VPN concentrator.

A

E. The VPN concentrator’s certificate private key must be installed on the VPN concentrator.

F. The CA’s certificate public key must be installed on the VPN concentrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ann, a software developer, wants to publish her newly developed software to an online store. Ann wants to ensure that the software will not be modified by a third party or end users before being installed on mobile devices. Which of the following should Ann implement to stop modified copies of her software from running on mobile devices?

A. Single sign-on
B. Identity propagation
C. Remote attestation
D. Secure code review

A

C. Remote attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Two separate companies are in the process of integrating their authentication infrastructure into a unified single sign-on system. Currently, both companies use an AD backend and two factor authentication using TOTP. The system administrators have configured a trust relationship
between the authentication backend to ensure proper process flow. How should the employees request access to shared resources before the authentication integration is complete?

A. They should logon to the system using the username concatenated with the 6-digit code and their
original password.

B. They should logon to the system using the newly assigned global username: first.lastname####
where #### is the second factor code.

C. They should use the username format: LAN\first.lastname together with their original password
and the next 6-digit code displayed when the token button is depressed.

D. They should use the username format: first.lastname@company.com, together with a password
and their 6-digit code.

A

D. They should use the username format: first.lastname@company.com, together with a password
and their 6-digit code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An industry organization has implemented a system to allow trusted authentication between all of its partners. The system consists of a web of trusted RADIUS servers communicating over the Internet. An attacker was able to set up a malicious server and conduct a successful man-in-the middle attack. Which of the following controls should be implemented to mitigate the attack in the
future?

A. Use PAP for secondary authentication on each RADIUS server

B. Disable unused EAP methods on each RADIUS server

C. Enforce TLS connections between RADIUS servers

D. Use a shared secret for each pair of RADIUS servers

A

C. Enforce TLS connections between RADIUS servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Joe, the Chief Executive Officer (CEO), was an Information security professor and a Subject Matter Expert for over 20 years. He has designed a network defense method which he says is significantly better than prominent international standards. He has recommended that the company use his cryptographic method. Which of the following methodologies should be adopted?

A. The company should develop an in-house solution and keep the algorithm a secret.

B. The company should use the CEO’s encryption scheme.

C. The company should use a mixture of both systems to meet minimum standards.

D. The company should use the method recommended by other respected information security
organizations.

A

D. The company should use the method recommended by other respected information security
organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following BEST constitutes the basis for protecting VMs from attacks from other VMs hosted on the same physical platform?

A. Aggressive patch management on the host and guest OSs.

B. Host based IDS sensors on all guest OSs.

C. Different antivirus solutions between the host and guest OSs.

D. Unique Network Interface Card (NIC) assignment per guest OS.

A

A. Aggressive patch management on the host and guest OSs.

17
Q

Two universities are making their 802.11n wireless networks available to the other university’s students. The infrastructure will pass the student’s credentials back to the home school for authentication via the Internet.

The requirements are:

  • Mutual authentication of clients and authentication server
  • The design should not limit connection speeds
  • Authentication must be delegated to the home school
  • No passwords should be sent unencrypted

The following design was implemented:

  • WPA2 Enterprise using EAP-PEAP-MSCHAPv2 will be used for wireless security
  • RADIUS proxy servers will be used to forward authentication requests to the home school
  • The RADIUS servers will have certificates from a common public certificate authority
  • A strong shared secret will be used for RADIUS server authentication

Which of the following security considerations should be added to the design?

A. The transport layer between the RADIUS servers should be secured

B. WPA Enterprise should be used to decrease the network overhead

C. The RADIUS servers should have local accounts for the visiting students

D. Students should be given certificates to use for authentication to the network

A

A. The transport layer between the RADIUS servers should be secured

18
Q

A company with 2000 workstations is considering purchasing a HIPS to minimize the impact of a
system compromise from malware. Currently, the company projects a total cost of $50,000 for the
next three years responding to and eradicating workstation malware. The Information Security
Officer (ISO) has received three quotes from different companies that provide HIPS.

  • The first quote requires a $10,000 one-time fee, annual cost of $6 per workstation, and a 10% annual support fee based on the number of workstations.
  • The second quote requires a $15,000 one-time fee, an annual cost of $5 per workstation, and a 12% annual fee based on the number of workstations.
  • The third quote has no one-time fee, an annual cost of $8 per workstation, and a 15% annual fee based on the number of workstations.

Which solution should the company select if the contract is only valid for three years?

A. First quote
B. Second quote
C. Third quote
D. Accept the risk

A

B. Second quote

19
Q

Customers are receiving emails containing a link to malicious software. These emails are subverting spam filters. The email reads as follows:

Delivered-To: customer@example.com

Received: by 10.14.120.205
Mon, 1 Nov 2010 11:15:24 -0700 (PDT)

Received: by 10.231.31.193
Mon, 01 Nov 2010 11:15:23 -0700 (PDT)

Return-Path:

Received: from 127.0.0.1 for ; Mon, 1 Nov 2010 13:15:14 -0500
(envelope-from )

Received: by smtpex.example.com (SMTP READY)
with ESMTP (AIO); Mon, 01 Nov 2010 13:15:14 -0500

Received: from 172.18.45.122 by 192.168.2.55; Mon, 1 Nov 2010 13:15:14 -0500

From: Company

To: “customer@example.com”

Date: Mon, 1 Nov 2010 13:15:11 -0500

Subject: New Insurance Application

Thread-Topic: New Insurance Application
Please download and install software from the site below to maintain full access to your account.
www.examplesite.com
________________________________

Additional information: The authorized mail servers IPs are 192.168.2.10 and 192.168.2.11.

The network’s subnet is 192.168.2.0/25.

Which of the following are the MOST appropriate courses of action a security administrator could take to eliminate this risk? (Select TWO).

A. Identify the origination point for malicious activity on the unauthorized mail server.

B. Block port 25 on the firewall for all unauthorized mail servers.

C. Disable open relay functionality.

D. Shut down the SMTP service on the unauthorized mail server.

E. Enable STARTTLS on the spam filter

A

B. Block port 25 on the firewall for all unauthorized mail servers.

D. Shut down the SMTP service on the unauthorized mail server.

20
Q

A web developer is responsible for a simple web application that books holiday accommodations.
The front-facing web server offers an HTML form, which asks for a user’s age. This input gets placed into a signed integer variable and is then checked to ensure that the user is in the adult age range.

Users have reported that the website is not functioning correctly. The web developer has inspected log files and sees that a very large number (in the billions) was submitted just before the issue started occurring. Which of the following is the MOST likely situation that has occurred?

A. The age variable stored the large number and filled up disk space which stopped the application
from continuing to function. Improper error handling prevented the application from recovering.

B. The age variable has had an integer overflow and was assigned a very small negative number
which led to unpredictable application behavior. Improper error handling prevented the application
from recovering.

C. Computers are able to store numbers well above “billions” in size. Therefore, the website issues
are not related to the large number being input.

D. The application has crashed because a very large integer has lead to a “divide by zero”. Improper
error handling prevented the application from recovering.

A

B. The age variable has had an integer overflow and was assigned a very small negative number which led to unpredictable application behavior. Improper error handling prevented the application
from recovering.

21
Q

A company has decided to change its current business direction and refocus on core business. Consequently, several company sub-businesses are in the process of being sold-off. A security consultant has been engaged to advise on residual information security concerns with a demerger. From a high-level perspective, which of the following BEST provides the procedure that the consultant should follow?

A. Perform a penetration test for the current state of the company. Perform another penetration test after the de-merger. Identify the gaps between the two tests.

B. Duplicate security-based assets should be sold off for commercial gain to ensure that the security
posture of the company does not decline.

C. Explain that security consultants are not trained to offer advice on company acquisitions or
demergers. This needs to be handled by legal representatives well versed in corporate law.

D. Identify the current state from a security viewpoint. Based on the demerger, assess what the security gaps will be from a physical, technical, DR, and policy/awareness perspective.

A

D. Identify the current state from a security viewpoint. Based on the demerger, assess what the security gaps will be from a physical, technical, DR, and policy/awareness perspective.

22
Q

It has come to the IT administrator’s attention that the “post your comment” field on the company blog page has been exploited, resulting in cross-site scripting attacks against customers reading the blog. Which of the following would be the MOST effective at preventing the “post your comment” field from being exploited?

A. Update the blog page to HTTPS
B. Filter metacharacters
C. Install HIDS on the server
D. Patch the web application
E. Perform client side input validation
A

B. Filter metacharacters

23
Q

A business unit of a large enterprise has outsourced the hosting and development of a new external website which will be accessed by premium customers, in order to speed up the time to market timeline. Which of the following is the MOST appropriate?

A. The external party providing the hosting and website development should be obligated under
contract to provide a secure service which is regularly tested (vulnerability and penetration). SLAs
should be in place for the resolution of newly identified vulnerabilities and a guaranteed uptime.

B. The use of external organizations to provide hosting and web development services is not
recommended as the costs are typically higher than what can be achieved internally. In addition,
compliance with privacy regulations becomes more complex and guaranteed uptimes are difficult
to track and measure.

C. Outsourcing transfers all the risk to the third party. An SLA should be in place for the resolution of
newly identified vulnerabilities and penetration / vulnerability testing should be conducted
regularly.

D. Outsourcing transfers the risk to the third party, thereby minimizing the cost and any legal
obligations. An MOU should be in place for the resolution of newly identified vulnerabilities and
penetration / vulnerability testing should be conducted regularly.

A

A. The external party providing the hosting and website development should be obligated under
contract to provide a secure service which is regularly tested (vulnerability and penetration). SLAs
should be in place for the resolution of newly identified vulnerabilities and a guaranteed uptime.

24
Q

An administrator is tasked with securing several website domains on a web server. The administrator elects to secure www.example.com, mail.example.org, archive.example.com, and www.example.org with the same certificate. Which of the following would allow the administrator to secure those domains with a single issued certificate?

A. Intermediate Root Certificate
B. Wildcard Certificate
C. EV x509 Certificate
D. Subject Alternative Names Certificate

A

D. Subject Alternative Names Certificate

25
Q

An administrator wishes to replace a legacy clinical software product as it has become a security risk. The legacy product generates $10,000 in revenue a month. The new software product has an initial cost of $180,000 and a yearly maintenance of $2,000 after the first year. However, it will generate $15,000 in revenue per month and be more secure. How many years until there is a
return on investment for this new package?

A. 1
B. 2
C. 3
D. 4

A

D. 4