CASP Flashcards
Company ABCs SAN is nearing capacity and will cause costly downtime if servers run out of disk space. What is a more cost effective alternative to buying a new SAN?
Enable deduplication on the storage pools.
A system administrator establishes a CIFS share on a UNIX device to share data to Windows systems. The security authentication on the windows domain is set to the highest level. Window domain users are stating that they cannot authenticate to the UNIX share. Which settings on the UNIX server would correct this problem?
Refuse LM and only accept NTLMv2.
Two universities are making their 802.11n wireless networks available to the other university students. The infrastructure will pass the students credentials back the home school for authentication via the internet. Requirements are no passwords should be sent unencrypted, authentication must be delegated to the home school, design should not limit connect speeds and mutual authentication of clients and authentication server. WPA2 Enterprise using EAP-PEAP-MSCHAPv2 will be used for wireless security. Radius proxy servers will be used to forward authentication requests to the home school. The Radius server will have certifications from a common public certificate authority. A strong shared secret key will be used for RADIUS server authentication. What additional security consideration should be added to the design?
Transport layer between the RADIUS servers should be secured.
A large organization has recently suffered a massive credit card breach. During the months of incident response there were multiple attempts to assign blame for whose fault it was that the incident occurred. In which part of the incident response phase would this be addressed in a controlled and productive manner?
During the lessons learned phase.
Three companies want to allow their employees to seamlessly connect to each others wireless corporate networks while keeping one consistent wireless client configuration. Each company wants to maintain its own authentication infrastructure and wants to ensure that an employee who is visiting the other two companies is authenticated by the home office when connecting to the other companies wireless networks. All three companies have agreed to standardize on 802.1v EAP-PEAP-MSCHAP for client configuration. What should the also be implemented in this situation?
The three companies should agree on a single SSID and a hierarchical RADIUS system which implements trust delegation.
A university requires a significant increase in web and database server resources for one week, twice a year, to handle student registration. The web servers remain idle for the rest of the year. What is the most cost effective way for the university to securely handle student registration?
Move the web server to an elastic public cloud while keeping the database server local.
A security administrator wants to prevent sensitive data residing on corporate laptops and desktops from leaking outside of the corporate network. The company has already implemented full-disk encryption and has disabled all peripheral devices on its desktops and laptops. What additional controls must be implemented to minimize the risk of data leakage?
- A DLP gateway should be installed at the company border
2. Full tunnel VPN should be required for all network communication
The Risk Manager has requested a security solution that is centrally managed, can easily be updated and protects end users work stations from both known and unknown malicious attacks when connected to either office or home network. What would be meet this requirement?
HIPS
A source workstation image for new accounting PCs has begun blue-screening. A technician notices that the date/time stamp of the image source appears to have changed. The desktop support director has asked the Information Security department to determine if any changes were made to the source image. What methods would best help with this process?
- Retrieve source system image from backup and run file comparison analysis on the two images.
- Calculate a new hash and compare it with the previously captured image hash.
A security administrator notices a recent increase in workstations becoming compromised by malware. Often the malware is delivered via drive-by and is not being detected by the corporate antivirus. Which solutions would BEST provide the protection for the company?
Deploy a cloud based content filter and enable the appropriate category to prevent further infections.
A security consultant is conducting a network assessment and wishes to discover any legacy backup internet connections the network may have. Where would the consultant find this information and why would it be valuable?
This information can be found in global routing tables because backup connections typically do not have perimeter protection as strong as the primary connection.
Helpdesk department desires to roll out a remote support application for internal use on all company computers. This tool should allow remote desktop sharing, system log gathering, chat, hardware logging, inventory management, and remote registry access. The risk management team has been asked to review vendor responses to the RFQ. Which of the following is MOST important?
What accountability is built into the remote support application.
The helpdesk manager wants to find a solution that will enable the helpdesk staff to better serve company employees who call for computer related problems. The helpdesk staff is currently unable to perform effective troubleshooting and relies on callers to describe their technology problems. Given that the helpdesk staff is located within the company headquarters and 90% of the callers are telecommuters, which of the following tools should the helpdesk manager use to make the staff more effective at troubleshooting while at the same time reducing company costs?
Instant messaging and Desktop sharing.
A new internal network segmentation solution will be implemented into the enterprise that consists of 200 internal firewalls. As part of a running pilot exercise, it was determined that it takes three changes to deploy a new application onto the network before it is operational. Security not has a significant effect on overall availability. Which of the following would be the FIRST process to perform as a result of these findings?
Review to determine if control effectiveness is in line with the complexity of the solution. Determine if the requirements can be met with a simpler solution.
A company is in the process of implementing a new front end user interface for its customers, the goal is to provide them with more self service functionality. The application has been written by developers over the last six months and the project is currently in the test phase. Which of the following security activities should be implemented as part of the SDL in order to provide the most security coverage over the solution.
- Perform grey box penetration testing over the solution.
2. Perform static code review over the front end source code.
Security analyst has been asked to develop a quantitive risk analysis and risk assessment for the company’s online shopping application. Based on heuristic information from the Security Operations Center, a Denial of Service attack has been successfully executed 5 times a year. The Business Operations Department has determined the loss associated to each attack is $40000. After implementing application caching the number of DoS attacks was reduced to one time a year. What is the monetary value earned during the first year of operation.
$60000
At 9:00 am each morning all the virtual desktops in a VDI implementation become extremely slow and/or unresponsive. The outage lasts for 10 minutes after which every thing runs properly again. The administrator has traced the problem to a lab of thin clients that are all booted at 9:00 am each morning. What is the most likely cause of the problem and the BEST solution to fit it.
Booting all the lab desktops at the same time is creating excessive I/O.
Install a faster SSD drives in the storage system used in the infrastructure.
In order to reduce the costs and improve employee satisfaction, a large corporation is creating a BYOD policy. It will allow access to email and remote connections to the corporate enterprise from personal devices, provided they are on an approved list. What security measure is will be the MOST effective in securing the enterprise under the new policy?
- Encrypt data in transit for remote access.
2. Implement NAC to limit insecure device access.
There have been some failures of the company’s internal facing website. A security engineer has found the WAF to be the root cause of the failure. System logs show that the WAF has been unavailable for 14 hours over the past month in four separate situations. One of these situations was a two hour scheduled maintenance time aimed at improving the stability of the WAF. Using the MTTR based on the last months performance figures, which of the following calculations is the percentage of uptime assuming there were 722 hours in a month?
98.34 percent.
A system administrator needs to meet the maximum amount of security goals for a new DNS infrastructure. The administrator deploys DNSSEC extensions to the domain names and infrastructure. Which of the following security goals does this meet?
Authentication and Integrity.
A security administrator wants to deploy a dedicated storage solution which is inexpensive, can natively integrate with AD, allow files to be selectively encrypted and is suitable for a small number of users at a satellite office. What would be the BEST meet this requirement?
NAS
The Chief Information Officer is reviewing the IT centric BIA and RA documentation. The document shows that a single 24 hours downtime in a critical business function will cost the business $2.3 million. Additionally, the business unit which depends on the critical business function has determined that there is a high probably that a threat will materialize based on historical data. The CIOs budget does not allow for full system hardware replacement in case of catastrophic failure nor does it allow for purchase of additional compensating controls. What should the CIO recommend to the finance director to minimize loss.
Company should transfer the risk.
The Human Resource manager at a software development company has been tasked with recruiting personnel for a new cyber defensive division at the company. This division will require personnel to have high technology skills and industry certifications. Which is the best method for this manager to gain insight into this industry to execute the task?
Attend conferences, webinars and training to remain current with the industry and job requirements.
The Chief Executive Officer of a company that allows telecommuting has challenged the Chief Security Officer request to hardened the corporation’s network perimeter. The CEO argues that the company cannot protect its employee at home so the risk at work is no different. Which of the following BEST explains why the company should proceed with protecting its corporate boundary?
The aggregation of employees a corporate network makes it more valuable target for attackers.