100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CASP 2022 $14.99   Add to cart

Exam (elaborations)

CASP 2022

 8 views  0 purchase
  • Course
  • Institution

C A security program alerts you of a failed logon attempt to a secure system. On investigation, you learn the system's normal user accidentally had caps lock turned on. What kind of alert was it? A. True positive B. True negative C. False positive D. False negative A Your security poli...

[Show more]

Preview 4 out of 33  pages

  • July 30, 2022
  • 33
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
avatar-seller
CASP
C - Answer A security program alerts you of a failed logon attempt to a secure system.
On investigation, you learn the system's normal user accidentally had caps lock turned
on. What kind of alert was it?

A. True positive
B. True negative
C. False positive
D. False negative

A - Answer Your security policy calls for the company's financial data archive to have its
confidentiality, integrity, availability, and accountability protected. Presently it's stored on
two redundant servers protected by strong passwords and transport encryption. What
additional control would achieve your security goals?

A. A version management system that tracks all user accounts and revisions
B. Full-disk encryption
C. Regular data backups
D. Two-factor authentication

B - Answer You work for a contracting company closely aligned with the US federal
government. Which organization's publications are likely to be most closely related to
your security compliance standards?

A. CIS
B. NIST
C. NSA
D. W3C

B, E - Answer Your internal network is protected by a Cisco firewall between the WAN
and the internal network. While its not having any problems, your supervisor suggests
installing a Fortinet firewall between the Cisco firewall and the trusted LAN in order to
create a new DMZ. Which security principles does this promote?

A. Availability
B. Defense in depth
C. Security by design
D. Security by obscurity
E. Vendor diversity

C - Answer You've found signs of unauthorized access to a web server, and on further
review the attacker exploited a software vulnerability you didn't know about. On
contacting the vendor of the server software, you learn that its a recently discovered

,vulnerability, but a hotfix is available pending the next software update. What kind of
vulnerability did they exploit? Choose the best response.

A. APT
B. Structural
C. Unknown
D. Zero-day

A - Answer Through your organization you've seen a pattern of attacks of different
types. Login attempts, malware, phishing emails, application exploits, and so on. None
of the individual techniques are that exotic or hard to stop, but they're seemingly
endless and most seem to be the work of the same group of attackers. What kind of
threat is this? Choose the best response.

A. APT
B. Structural
C. Unknown
D. Zero-day

D - Answer For your new security consulting position, you're helping a hospital secure
its HR database. It includes employee records such as contact information, employment
history, and payment data. What would this information be classified as? Choose the
best response.

A. IP
B. PCI
C. PHI
D. PII

A - Answer You've been tracking a new form of malware on your network. It seems to
primarily work by attacking web browsers when they visit certain external website. What
parts of the network should your analysis focus on? Choose the best response.

A. Endpoints
B. Network Appliances
C. SCADA devices
D. Servers

5,2,1,4,6,3 - Answer Order the steps of a complete risk assessment.

1. Analyze business impact
2. Conduct a threat assessment
3. Create a mitigation strategy
4. Evaluate threat probability
5. Identify assets at risk
6. Prioritize risks

,B - Answer You're shopping for a new A/C unit for your server room, and are comparing
manufacturer ratings. Which combination will minimize the time you'll have to go without
sufficient cooling? Choose the best response.

A. High MTBF and high MTTR
B. High MTBF and low MTTR
C. Low MTBF and high MTTR
D. Low MTBF and low MTTR

A - Answer A critical database is prone to occasional corruption issues due to
application flaws. The corruption doesn't actually cause data loss, but it interrupts
service and takes time to repair. Last year it happened four times, and the service
disruptions caused a total of $120,000 in revenue loss. Using the past year for an
estimate, if you include this threat into a quantitative risk assessment, what would the
SLE be? Choose the best response.

A. $30,000
B. $40,000
C. $120,000
D. $480,000

C - Answer You're performing a FIPS 199 impact analysis of a DBMS containing two
separate databases. If SC_DB1 = { (confidentiality, MODERATE), (integrity,
MODERATE), (availability, HIGH) } and SC_DB2 = { (confidentiality, LOW), (integrity,
HIGH), (availability, LOW) }, how would you rate the impact for the DBMS itself?
Choose the best response.

A. { (confidentiality, MODERATE), (integrity, MODERATE), (availability, HIGH) }
B. { (confidentiality, LOW), (integrity, HIGH), (availability, LOW) }
C. { (confidentiality, MODERATE), (integrity, HIGH), (availability, HIGH) }
D. { (confidentiality, MODERATE), (integrity, MODERATE), (availability, MODERATE) }

A,B,E - Answer A multinational corporation is integrating multiple business units into a
unified information system. Which of the following does it need to perform in order to do
so? Choose all that apply.

A. Analyze the benefits and drawbacks of centralizing network and security rules.
B. Apply a unified standard to information sharing between business units.
C. Ensure that all business units meet the same regulatory compliance standards.
D. Ensure that all business units have compatible high level policies.
E. Maintain independent security standards between business units wherever possible.

E - Answer Your company has long maintained an email server, but it's insecure and
unreliable. You're considering just outsourcing email to an external company who

, provides secure cloud-based email services. What risk management strategy would this
represent? Choose hte best response.

A. Risk acceptance
B. Risk avoidance
C. Risk deterrence
D. Risk mitigation
E. Risk transference

A - Answer What element of your risk mitigation strategy helps keep future additions to
your network from introducing new security vulnerabilities? Choose the best response.

A. Change management
B. Incident management
C. Security Audits
D. Technical controls

A,B,E - Answer Your organization has a legacy application which uses 3DES encryption
to communicate with a variety of remote systems, but newly enacted regulatory
requirements specify a minimum of 128-bit AES for such links. Replacing it will be a big
project, and for logistical and budgetary reasons it's certainly not doable this year. What
information would be useful in requesting an exemption? Choose all that apply.

A. A time frame in which you can replace the legacy system
B. Additional security controls you can use to mitigate risk until AES encryption can be
deployed
C. Copies of corporate policies which specified 3DES for the system
D. Reasons why AES encryption is not actually necessary for your security needs
E. Technical reasons why AES encryption cannot be deployed at this time

D - Answer Outages in a critical system cost your organization $250,000 in revenues a
year. You're evaluating a high availability solution that should reduce outages by 80%. It
will cost $150,000 to implement, and $50,000 per year to operate and maintain over the
next five years. What is the expected TCO for the high availability solution? Choose the
best response.

A. $80,000
B. $150,000
C. $200,000
D. $400,000

B - Answer "Outages in a critical system cost your organization $250,000 in revenues a
year. You're evaluating a high availability solution that should reduce outages by 80%. It
will cost $150,000 to implement, and $50,000 per year to operate and maintain over the
next five years."

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EvaTee. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76799 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.99
  • (0)
  Add to cart