CASP Study Deck 6 (126 - 150) Flashcards

1
Q

A large company is preparing to merge with a smaller company. The smaller company has been very profitable, but the smaller company’s main applications were created in-house. Which of the following actions should the large company’s security administrator take in preparation for the merger?

A. A review of the mitigations implemented from the most recent audit findings of the smaller company should be performed.

B. An ROI calculation should be performed to determine which company’s application should be used.

C. A security assessment should be performed to establish the risks of integration or co-existence.

D. A regression test should be performed on the in-house software to determine security risks associated with the software.

A

C. A security assessment should be performed to establish the risks of integration or co-existence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?

A. Deduplication
B. Data snapshots
C. LUN masking
D. Storage multipaths

A

C. LUN masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Company ABC is hiring customer service representatives from Company XYZ. The representatives reside at Company XYZ’s headquarters. Which of the following BEST prevents Company XYZ representatives from gaining access to unauthorized Company ABC systems?

A. Require each Company XYZ employee to use an IPSec connection to the required systems

B. Require Company XYZ employees to establish an encrypted VDI session to the required systems

C. Require Company ABC employees to use two-factor authentication on the required systems

D. Require a site-to-site VPN for intercompany communications

A

B. Require Company XYZ employees to establish an encrypted VDI session to the required systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Chief Information Security Officer (CISO) has requested that a SIEM solution be implemented.
The CISO wants to know upfront what the projected TCO would be before looking further into this
concern.

Two vendor proposals have been received:

Vendor A: product-based solution which can be purchased by the pharmaceutical company.

Capital expenses to cover central log collectors, correlators, storage and management consoles expected to be $150,000. Operational expenses are expected to be a 0.5 full time employee (FTE) to manage the solution, and 1 full time employee to respond to incidents per year.

Vendor B: managed service-based solution which can be the outsourcer for the pharmaceutical company’s needs.

Bundled offering expected to be $100,000 per year.

Operational expenses for the pharmaceutical company to partner with the vendor are expected to be a 0.5 FTE per year.

Internal employee costs are averaged to be $80,000 per year per FTE. Based on calculating TCO of the two vendor proposals over a 5 year period, which of the following options is MOST accurate?

A. Based on cost alone, having an outsourced solution appears cheaper.

B. Based on cost alone, having an outsourced solution appears to be more expensive.

C. Based on cost alone, both outsourced an in-sourced solutions appear to be the same.

D. Based on cost alone, having a purchased product solution appears cheaper.

A

A. Based on cost alone, having an outsourced solution appears cheaper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A port in a fibre channel switch failed, causing a costly downtime on the company’s primary website. Which of the following is the MOST likely cause of the downtime?

A. The web server iSCSI initiator was down.
B. The web server was not multipathed.
C. The SAN snapshots were not up-to-date.
D. The SAN replication to the backup site failed.

A

B. The web server was not multipathed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An internal development team has migrated away from Waterfall development to use Agile development. Overall, this has been viewed as a successful initiative by the stakeholders as it has improved time-to-market. However, some staff within the security team have contended that Agile development is not secure. Which of the following is the MOST accurate statement?

A. Agile and Waterfall approaches have the same effective level of security posture. They both need
similar amounts of security effort at the same phases of development.

B. Agile development is fundamentally less secure than Waterfall due to the lack of formal up-front
design and inability to perform security reviews.

C. Agile development is more secure than Waterfall as it is a more modern methodology which has
the advantage of having been able to incorporate security best practices of recent years.

D. Agile development has different phases and timings compared to Waterfall. Security activities
need to be adapted and performed within relevant Agile phases.

A

D. Agile development has different phases and timings compared to Waterfall. Security activities
need to be adapted and performed within relevant Agile phases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A vulnerability scanner report shows that a client-server host monitoring solution operating in the credit card corporate environment is managing SSL sessions with a weak algorithm which does not meet corporate policy. Which of the following are true statements? (Select TWO).

A. The X509 V3 certificate was issued by a non trusted public CA.

B. The client-server handshake could not negotiate strong ciphers.

C. The client-server handshake is configured with a wrong priority.

D. The client-server handshake is based on TLS authentication.

E. The X509 V3 certificate is expired.

F. The client-server implements client-server mutual authentication with different certificates.

A

B. The client-server handshake could not negotiate strong ciphers.

C. The client-server handshake is configured with a wrong priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following represents important technical controls for securing a SAN storage infrastructure? (Select TWO).

A. Synchronous copy of data

B. RAID configuration

C. Data de-duplication

D. Storage pool space allocation

E. Port scanning

F. LUN masking/mapping

G. Port mapping

A

F. LUN masking/mapping

G. Port mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An enterprise must ensure that all devices that connect to its networks have been previously approved. The solution must support dual factor mutual authentication with strong identity assurance. In order to reduce costs and administrative overhead, the security architect wants to outsource identity proofing and second factor digital delivery to the third party. Which of the
following solutions will address the enterprise requirements?

A. Implementing federated network access with the third party.

B. Using a HSM at the network perimeter to handle network device access.

C. Using a VPN concentrator which supports dual factor via hardware tokens.

D. Implementing 802.1x with EAP-TTLS across the infrastructure.

A

D. Implementing 802.1x with EAP-TTLS across the infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security administrator is performing VDI traffic data collection on a virtual server which migrates from one host to another. While reviewing the data collected by the protocol analyzer, the security administrator notices that sensitive data is present in the packet capture. Which of the following should the security administrator recommend to ensure the confidentiality of sensitive information during live VM migration, while minimizing latency issues?

A. A separate physical interface placed on a private VLAN should be configured for live host operations.

B. Database record encryption should be used when storing sensitive information on virtual servers.

C. Full disk encryption should be enabled across the enterprise to ensure the confidentiality of sensitive data.

D. Sensitive data should be stored on a backend SAN which uses an isolated fiber channel network.

A

A. A separate physical interface placed on a private VLAN should be configured for live host operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly