casp2 Flashcards

1
Q
  1. A security engineer needs to recommend a solution that will meet the following requirements: Identify sensitive data in the provider’s network

Maintain compliance with company and regulatory guidelines
Detect and respond to insider threats, privileged user threats, and compromised accounts Enforce datacentric security, such as encryption, tokenization, and access control
Which of the following solutions should the security engineer recommend to address these requirements?
A. WAF
B. CASB
C. SWG
D. DLP

A

C. SWG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A security engineer estimates the company’s popular web application experiences 100 attempted breaches per day. In the past four years, the company’s data has been breached two times.
    Which of the following should the engineer report as the ARO for successful breaches?
    A. 0.5
    B. 8
    C. 50
    D. 36,500
A

A. 0.5
AVEF = SLE SLEARO = ALE
ARO – twice every 4 yrs or 2/4 on an annual basis = 0.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. A security engineer needs to implement a solution to increase the security posture of user endpoints by providing more visibility and control over local administrator accounts. The endpoint security team is overwhelmed with alerts and wants a solution that has minimal operational burdens. Additionally, the solution must maintain a positive user experience after implementation.
    Which of the following is the BEST solution to meet these objectives?
    A. Implement Privileged Access Management (PAM), keep users in the local administrators group, and enable local administrator account monitoring.
    B. Implement PAM, remove users from the local administrators group, and prompt users for explicit approval when elevated privileges are required.
    C. Implement EDR, remove users from the local administrators group, and enable privilege escalation monitoring.
    D. Implement EDR, keep users in the local administrators group, and enable user behavior analytics.
A

B. Implement PAM, remove users from the local administrators group, and prompt users for explicit approval when elevated privileges are required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A small business requires a low-cost approach to theft detection for the audio recordings it produces and sells. Which of the following techniques will MOST likely meet the business’s needs?
    A. Performing deep-packet inspection of all digital audio files
    B. Adding identifying filesystem metadata to the digital audio files
    C. Implementing steganography
    D. Purchasing and installing a DRM suite
A

D. Purchasing and installing a DRM suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Clients are reporting slowness when attempting to access a series of load-balanced APIs that do not require authentication. The servers that host the APIs are showing heavy CPU utilization. No alerts are found on the WAFs sitting in front of the APIs.
    Which of the following should a security engineer recommend to BEST remedy the performance issues in a timely manner?
    A. Implement rate limiting on the API.
    B. Implement geoblocking on the WAF.
    C. Implement OAuth 2.0 on the API.
    D. Implement input validation on the API.
A

A. Implement rate limiting on the API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. An organization is considering a BYOD standard to support remote working. The first iteration of the solution will
    utilize only approved collaboration applications and the ability to move corporate data between those applications. The security team has concerns about the following:

Unstructured data being exfiltrated after an employee leaves the organization Data being exfiltrated as a result of compromised credentials
Sensitive information in emails being exfiltrated

Which of the following solutions should the security team implement to mitigate the risk of data loss?
A. Mobile device management, remote wipe, and data loss detection
B. Conditional access, DoH, and full disk encryption
C. Mobile application management, MFA, and DRM
D. Certificates, DLP, and geofencing

A

A. Mobile device management, remote wipe, and data loss detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Due to locality and budget constraints, an organization’s satellite office has a lower bandwidth allocation than other offices in the organization. As a result, the local security infrastructure staff is assessing architectural options that will help preserve network bandwidth and increase speed to both internal and external resources while not sacrificing threat visibility.
    Which of the following would be the BEST option to implement?
    A. Distributed connection allocation
    B. Local caching
    C. Content delivery network
    D. SD-WAN vertical heterogeneity
A

B. Local caching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following are risks associated with vendor lock-in? (Choose two.)

A. The client can seamlessly move data.
B. The vendor can change product offerings.
C. The client receives a sufficient level of service.
D. The client experiences decreased quality of service.
E. The client can leverage a multicloud approach.
F. The client experiences increased interoperability

A

B. The vendor can change product offerings.
D. The client experiences decreased quality of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A security analyst is investigating a possible buffer overflow attack. The following output was found on a user’s workstation:
    graphic.linux_randomization.prg
    Which of the following technologies would mitigate the manipulation of memory segments?
    A. NX bit
    B. ASLR
    C. DEP
    D. HSM
A

B. ASLR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A security analyst is researching containerization concepts for an organization. The analyst is concerned about potential resource exhaustion scenarios on the Docker host due to a single application that is overconsuming available resources.
    Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?
    A. Union filesystem overlay
    B. Cgroups
    C. Linux namespaces
    D. Device mapper
A

B. Cgroups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. A company is moving most of its customer-facing production systems to the cloud-facing production systems to the cloud. IaaS is the service model being used. The Chief Executive Officer is concerned about the type of encryption available and requires the solution must have the highest level of security.
    Which of the following encryption methods should the cloud security engineer select during the implementation phase?
    A. Instance-based
    B. Storage-based
    C. Proxy-based
    D. Array controller-based
A

A. Instance-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?
    A. Importing the availability of messages
    B. Ensuring non-repudiation of messages
    C. Enforcing protocol conformance for messages
    D. Assuring the integrity of messages
A

C. Enforcing protocol conformance for messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. A company wants to protect its intellectual property from theft. The company has already applied ACLs and DACs.
    Which of the following should the company use to prevent data theft?
    A. Watermarking
    B. DRM
    C. NDA
    D. Access logging
A

B. DRM
DRM (Digital Rights Management) allows us to control what may be done with information even after it has left out network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. A company processes data subject to NDAs with partners that define the processing and storage constraints for the covered data. The agreements currently do not permit moving the covered data to the cloud, and the company would like to renegotiate the terms of the agreements.
    Which of the following would MOST likely help the company gain consensus to move the data to the cloud?
    A. Designing data protection schemes to mitigate the risk of loss due to multitenancy
    B. Implementing redundant stores and services across diverse CSPs for high availability
    C. Emulating OS and hardware architectures to blur operations from CSP view
    D. Purchasing managed FIM services to alert on detected modifications to covered data
A

A. Designing data protection schemes to mitigate the risk of loss due to multitenancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Ransomware encrypted the entire human resources fileshare for a large financial institution. Security operations personnel were unaware of the activity until it was too late to stop it. The restoration will take approximately four hours, and the last backup occurred 48 hours ago. The management team has indicated that the RPO for a disaster recovery event for this data classification is 24 hours.
    Based on RPO requirements, which of the following recommendations should the management team make?
    A. Leave the current backup schedule intact and pay the ransom to decrypt the data.
    B. Leave the current backup schedule intact and make the human resources fileshare read-only.
    C. Increase the frequency of backups and create SIEM alerts for IOCs.
    D. Decrease the frequency of backups and pay the ransom to decrypt the data.
A

C. Increase the frequency of backups and create SIEM alerts for IOCs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. A company undergoing digital transformation is reviewing the resiliency of a CSP and is concerned about meeting SLA requirements in the event of a CSP incident.
    Which of the following would be BEST to proceed with the transformation?
    A. An on-premises solution as a backup
    B. A load balancer with a round-robin configuration
    C. A multicloud provider solution
    D. An active-active solution within the same tenant
A

D. An active-active solution within the same tenant

17
Q
  1. A company has hired a security architect to address several service outages on the endpoints due to new malware. The Chief Executive Officer’s laptop was impacted while working from home. The goal is to prevent further endpoint disruption. The edge network is protected by a web proxy.
    Which of the following solutions should the security architect recommend?
    A. Replace the current antivirus with an EDR solution.

B. Remove the web proxy and install a UTM appliance.
C. Implement a deny list feature on the endpoints.
D. Add a firewall module on the current antivirus solution.

A

A. Replace the current antivirus with an EDR solution.

18
Q
  1. All staff at a company have started working remotely due to a global pandemic. To transition to remote work, the company has migrated to SaaS collaboration tools. The human resources department wants to use these tools to process sensitive information but is concerned the data could be:
    Leaked to the media via printing of the documents Sent to a personal email address
    Accessed and viewed by systems administrators Uploaded to a file storage site
    Which of the following would mitigate the department’s concerns?
    A. Data loss detection, reverse proxy, EDR, and PGP
    B. VDI, proxy, CASB, and DRM
    C. Watermarking, forward proxy, DLP, and MFA
    D. Proxy, secure VPN, endpoint encryption, and AV
A

A. Data loss detection, reverse proxy, EDR, and PGP

19
Q
  1. A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:
    Unauthorized insertions into application development environments
    Authorized insiders making unauthorized changes to environment configurations
    Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)
    A. Perform static code analysis of committed code and generate summary reports.
    B. Implement an XML gateway and monitor for policy violations.
    C. Monitor dependency management tools and report on susceptible third-party libraries.
    D. Install an IDS on the development subnet and passively monitor for vulnerable services.
    E. Model user behavior and monitor for deviations from normal.
    F. Continuously monitor code commits to repositories and generate summary logs
A

C. Monitor dependency management tools and report on susceptible third-party libraries.
D. Install an IDS on the development subnet and passively monitor for vulnerable services.

20
Q
  1. An organization is designing a network architecture that must meet the following requirements: Users will only be able to access predefined services.
    Each user will have a unique allow list defined for access.
    The system will construct one-to-one subject/object access paths dynamically.
    Which of the following architectural designs should the organization use to meet these requirements?
    A. Peer-to-peer secure communications enabled by mobile applications
    B. Proxied application data connections enabled by API gateways
    C. Microsegmentation enabled by software-defined networking
    D. VLANs enabled by network infrastructure devices
A

C. Microsegmentation enabled by software-defined networking