CASP+ CompTIA Advanced Security Practitioner Practice Tests. Nadean H. Tanner. Читать онлайн. Newlib. NEWLIB.NET

Автор: Nadean H. Tanner
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная компьютерная литература
Год издания: 0
isbn: 9781119813064
Скачать книгу
information about their origin is maintained while not distorting the visual contents of the documents?BlowfishSteganographic watermarkingDigital signaturesPKI

      157 Charlie works for a publisher and has been tasked with protecting the electronic media they produce. This will help ensure they receive the revenue for the product they produce. What is Charlie going to implement?Single point-of-failureDigital rights managementSeparate of dutiesMandatory vacations

      158 As a security analyst, Ben is searching for a method that can examine network traffic and filter its payload based on rules. What is this method called?Network flowDLPData flow enforcementDeep packet inspection

      159 You are a security administrator reviewing network logs. You notice a UDP trend where traffic increased more than 30 percent in the past 48 hours. You use Wireshark to capture the packets and see the following: UDP 192.168.1.1:123->46.110.10.5:123. What attack scenario is most likely occurring?You are being attacked via the NTP client side and successfully exploited on 192.168.1.1.You are being attacked via the NTP server side and unsuccessfully exploited on 192.168.1.1.You are being attacked via the DNS client side and successfully exploited on 192.168.1.1.You are being attacked via the DNS server side and successfully exploited on 192.168.1.1.

      160 René is working with upper management to classify data to be shared in his collaboration tool, which will create extra security controls limiting the likelihood of a data breach. What principle of information security is he trying to enforce?ConfidentialityIntegrityAccountabilityAvailability

      161 A new objective for your department is to establish data provenance or historical data records. Moving forward, you must now document the data's source and all manipulations performed on it. Every data item will have detailed information about its origin and the ways it was influenced. Why is this crucial to the security of the data?Unauthorized changes in metadata can lead you to the wrong datasets.Authorized changes to the data warehouse can lead you to the wrong datasets.Traceable data sources make it difficult to find security breaches.Traceable data sources make it difficult to find fake data generation.

      162 Your CTO believes in the adage “Security through obscurity.” Which of the following types of obfuscation makes a program obscure to other computers?PreventionSaturationControl flowData

      163 Lynn uses a process that substitutes a sensitive data element with something that is not sensitive. She uses this process to map back to the sensitive data. What is this called?MaskingEncryptionTokenizationAuthorization

      164 Which of the following storage techniques should you deploy if you want the option to selectively provide availability to some hosts and to restrict availability to others by using a masking process?NASSANiSCSILUN

      165 Ashton's end users are using mobile devices to access confidential information on the corporate network. He needs to ensure that the information from all databases is kept secure as it is transmitted to these mobile devices. Encryption is a requirement. Of the following options, which one best describes a major concern with PII on mobile devices?Mobile devices have more processing power than other computing devices.Mobile devices typically have less processing power than other computing devices.Mobile devices often have increased complexities.Mobile devices often have difficulties to obfuscate personal data.

      166 Bob needs your professional opinion on encryption capabilities. You explained to him that cryptography supports all the core principles of information security, with one exception. What is that exception?AnonymityIntegrityConfidentialityAvailability

      167 Your app developers focus on the speed of app development more than security. Because of this, they use easy-to-implement encryption algorithms with known vulnerabilities. What is the result of using this type of encryption algorithm?Malware infectionModificationAttacker cracking the passwordsRemote code execution

      168 After a meeting with the board of directors, your CEO is looking for a way to boost profits. He identified a need to implement cost savings on non-core-related business activities, and the suggestion was made to move the corporate email system to the cloud. You are the compliance officer tasked with making sure security and data issues are handled properly. What best describes your process?End-to-end encryption, creation, and the destruction of mail accountsVendor selection and RFP/RFQSecuring all virtual environments that handle emailData provisioning and processing while in transit and at rest

      169 Evan's cyber-company has officially grown out of its startup phase, and his team is tasked with creating a pre-disaster preparation plan that will sustain the business should a disaster, natural or human-made, occur. Which of the following is the most important?Offsite backupsCopies of the BDRMaintaining a warm siteChain of command

      170 Christopher is a web developer. He built a web form for customers to fill out and respond to the company via a web page. What is the first thing that a developer should do to prevent this page from becoming a security risk?SQLiInput validationCross-site request forgeryFuzzing

      171 Marketing has put in a request for web-based meeting software with a third-party vendor. The software programs that you, a security analyst, have reviewed requires user registration and installation, and that user has to share their data as well as their desktop. To ensure that information is secure, which of the following controls is best?Disallow the software; avoid the risk.Hire a third-party organization to perform the risk analysis, and based on outcomes, allow or disallow the software.Log and record every single web-based meeting.After evaluating several providers, ensure acceptable risk and that the read-write desktop mode can be prevented.

      172 With the rise of malware spread with removable media, your company wrote an amendment to include a ban of all flashcards and memory drives. They pose a threat due to all but which of the following?Physical sizeTransportabilityStorage capacityBeing cheap and easy to use

      173 A server holding sensitive financial records is running out of room. You are the information security manager and data storage falls under your purview. What is the best option?Use first in, first out (FIFO).Compress and archive the oldest data.Move the data to the cloud.Add disk space in a RAID configuration.

      174 A situation that affects the CIA triad of an IT asset can include an internal and external risk source. A breach of physical security and theft of data can be instigated by_________________.untrusted insiders or trusted outsiderstrusted insiders or untrusted outsidershidden costsservice deterioration

      175 During what phase of eDiscovery will you determine what digital data and documents should be collected for possible analysis and review?ProcessingIdentificationCollectionCuration

      176 You are a small company administrator hosting multiple virtualized client servers on a single host. You are told to add a new host to create a cluster. The new hardware and OS will be different, but the underlying technology will be compatible. Both hosts will be sharing the same storage. What goal are you trying to accomplish?Increased availabilityIncreased confidentialityIncreased integrityIncreased certification

      177 Good data management includes which of the following?Data quality procedures, verification and validation, adherence to agreed-upon data management, and an ongoing data audit to monitor the use and integrity of existing dataCost, due care and due diligence, privacy, liability, and existing lawDetermining the impact the information has on the mission of the organization, understanding the cost of information, and determining who in the organization or outside of it has a need for the informationEnsuring the longevity of data and their reuse for multiple purposes, facilitating the interoperability of datasets, and increasing data sharing

      178 Bob is implementing a new RAID configuration needed for redundancy in the event of disk failure. What security goal is Bob trying to accomplish?AvailabilityIntegrityConfidentialityDisclosure

      179 You are monitoring your IT environment to detect techniques like credential dumping. Credential dumping is extracting usernames and passwords from a computer to then pass those credentials to other machines on a network. Where are the credentials stored on a Windows machine?In the SAMIn PSEXECIn Documents and SettingsIn WUTemp

      180 Jennie and her team are developing security policies, and they are currently working on a policy regarding password management. Which of these is not important?Account lockoutTraining users to create complex easy-to-remember passwords and not use the same password over againPreventing