Nadean H. Tanner

CASP+ Practice Tests


Скачать книгу

are developing a security policy regarding password management. Which of these is not important?Account lockoutTraining users to create complex, easy-to-remember passwords Preventing users from using personal information in a password, such as their birthday or spouse's nameStoring passwords securely

      121 As a hospital, you rely on some assets running high-end customized legacy software. What precaution should you implement to protect yourself if this developer goes out of business?Access controlService level agreementCode escrowOutsourcing

      122 A security analyst on your team was written up for a multitude of offenses. The latest transgression left you no choice but to terminate this employee. Which of the following is most important to do when informing the employee of their separation from the company?Allowing them to complete their projectGiving them two weeks' severanceAllowing them to collect their personal belongingsDisabling network access and changing the passwords to devices to which they had access

      123 As a CISO, you built a team of developers, managers, educators, architects, and administrators. Some of the people in these roles are finding they are duplicating efforts and not utilizing their time well. What can you use to initiate solid administrative control over the situation?AUPTCOMandatory vacationJob descriptions

      124 You have an amazing developer on staff. They are a great problem-solver and work very well with others. However, this developer continues to perform risky behavior on the network even after security awareness sessions and several warnings. What should you do next?Begin a separation of duties.Terminate them and perform an exit interview.Employ mandatory vacation.Decrease permissions.

      125 Your vulnerability manager contacted you because of an operating system issue. There are a few security-related issues due to patches and upgrades needed for an application on the systems in question. When is the BEST time to complete this task?As quickly as possible after testing.After experiencing the issue the vulnerability manager described. After other organizations have tested the patch or upgrade.During the usual monthly maintenance.

      126 You need to assign permissions so that users can access only the resources they need to complete specific tasks. Which security tenet should you utilize to meet the need?Separation of dutiesNeed to knowJob rotationLeast privilege

      127 You recorded data that includes security logs, object access, FIM, and other activities that your SIEM often uses to detect unwanted activity. Which of the following BEST describes this collection of data?Due diligenceSyslogIDRAudit trail

      128 You are tasked with hiring a third party to perform a security assessment of your manufacturing plant. What type of testing gives the most neutral review of your security profile?White hatGray hatBlack hatBlue hat

      129 You work in law enforcement supporting a network with HA. High availability is mandatory, as you also support emergency 911 services. Which of the following would hinder your HA ecosystem?Clustered serversPrimary firewallSwitched networksRedundant communication links

      130 You are tasked to with creating a security plan for your point-of-sale systems. What is the BEST methodology when you begin architecting?Outside inAssets outNo write upNo write down

      131 Alice needs some help developing security policy documentation. She turns to you for help in developing a document that contains instructions or information on how to remain in compliance with regulations. What document do you need to develop?ProceduresStandardsPolicyGuidelines

      132 You are the security administrator for a large governmental agency. You implemented port security, restricted network traffic, and installed NIDS, firewalls, and spam filters. You think the network is secure. Now you want to focus on endpoint security. What is the most comprehensive plan to follow?Anti-malware/virus/spyware, host-based firewall, and MFAAntivirus/spam, host-based IDS, and TFAAnti-malware/virus, host-based IDS, and biometricsAntivirus/spam, host-based IDS, and SSO

      133 You oversee hardware distribution for your global enterprise. You conduct a data analysis to figure out failure rates of a certain brand and model of laptop. You need to calculate the average number of times that specific model is likely to break in a year. Which of the following BEST describes your calculation?Annualized rate of occurrenceExposure factorSingle loss expectancyAnnualized loss expectancy

      134 Prioritization is an important part of your job as a security analyst. You are trying to calculate the ALE for all assets and risks. What purpose will this serve?To estimate insuranceTo arrive at a budget and head countTo prioritize countermeasuresTo inform design

      135 You need to calculate the ALE for an asset. Which of these is the proper formula?ARO × EF × AVARO × AVEF × SLEEF × SLE × AV

      136 As a software developer, you are frustrated with your customer who keeps calling you on the phone and leaving messages to make changes. What should you do to make the development process easier?Change control.Increase security. Apprise senior management.Provide detailed documentation.

      137 One of the software developers made a change in code that unintentionally diminishes security. Which of the following change control processes will be most effective in this situation?RollbackLoggingCompilingPatching

      138 A newly certified administrator makes a change to Group Policy for 12,000 users. The box is checked on the operating systems to not allow the overwriting of security logs. After 48 hours, no users can log into their domain accounts because the security logs have filled up. What change control process step was skipped?ApprovalTestingImplementationDeployment

      139 Your organization finds it difficult to distinguish what data can be shared with a customer and what should remain internal. They assigned you the task of data classification. What is the primary purpose of this task?Justification of expensesAssigning value to dataDefining necessary security protectionsControlling user access

      140 The security awareness training informed employees that within their operating systems an auditing feature was enabled. What form of control is used when end users are informed that their actions are monitored on the network?DirectiveCorrectiveDetectivePreventative

      141 Your external auditor submitted the final report to the board of directors and upper management. Who is responsible for implementing the recommendations in this report?End usersInternal auditorsSecurity administratorsSenior management

      142 A security vulnerability was discovered while a system went through the accreditation process. What action should come next?Start the accreditation process over again once the issue is fixed.Restart the accreditation process from when the issue was discovered.Reimage the system and start the accreditation from the beginning.Reimage the system and start from the current point.

      143 Your organization was breached, but you have been able to prove that sufficient due care was taken. What burden is eliminated?LiabilityInvestigationFinancial lossNegligence

      144 You are a security administrator and were notified by your IPS that there is an issue. You quickly solve the problem. What needs to be done once the problem has been fixed?After-action reportMOAIncident reportUpdate to security policy

      145 Your department was tasked with implementing Bluetooth connectivity controls to mitigate risk. Which of these BEST describes the network you will create?PANLANWANWLAN

      146 You are planning the site security for a new building. The network administrators would like the server room door to be secured with RFID. The security team would like to use a cipher lock. Loss of the data on these servers is high risk. What should your plan start with?A meeting to discuss security optionsSmartcardsTFA, both cipher lock and RFIDA keyed lock only

      147 You are a systems analyst conducting a vulnerability assessment. Which of the following is not a requirement for you to know?Access controlsUnderstanding of the systems to be evaluated Potential threatsPasswords

      148 You are made aware of a threat that involves a hacking group holding large amounts of information about your company. What BEST describes the threat you face from this hacking group?DoSTCOLatencyData mining

      149 Your CISO has asked you to evaluate an antivirus tool for all company-issued laptops. The cost is $3,000 for all 90 laptops. From historical data you anticipate that 12 computers will be affected with a SLE of $1,500. What do you recommend to the CISO?Accept