CASP Flashcards
(107 cards)
Which of the following encryption methodologies should be implemented in an environment where all users need access to bulk storage, but not all users have authorized access to each individual database entry?
Row-level encryption
A security bulletin describes a vulnerability in a common blogging platform due to XML HTTP Request (XHR) processing of state information. Which of the following technologies would this be a part of?
CSS
An organization is developing a new web application that can provide the ability for customers to retrieve fast quotes on products and services. After going live with the web application, the organization is seeing system outages and delays in presenting quotes to customers. Further investigation reveals the logs are seeing SQL queries with $username = ‘1’ or ‘1’ = ‘1’ that give results. Which of the following could prevent this query from being successful?
Stored procedures
An information systems manager has been asked to manage the consolidation of two merging companies’ IT infrastructures. As part of the project the manager will need to evaluate the impact of regulatory requirements relating to storage of data in data centers. Which of the following is a regulatory consideration the manager should evaluate?
Geographical location of data centers
An online gaming company receives two DoS attacks per year. Losses are estimated to be $200,000 per
incident. Executives have decided to invest $75,000 annually in performance and security services, which
reduced the annual loss by 30 percent. Which of the following is the return on investment?
$45,000
A company is evaluating an investment of $1.5 million in IT infrastructure upgrades. The upgrades will take
three years to be fully implemented but will be 80% implemented within 60 days. The remaining upgrades will be completed on an evenly distributed schedule. The board of directors is only willing to make the infrastructure investment if the cost of the upgrades can be recouped within 12 months. It is estimated that for every 10% of the infrastructure that is upgraded, an additional $200,000 in profit will be realized. Which of the following describes the length of time it will take for the investment to be fully paid for?
Less than two months
A security architect has the following requirements for a system:
1. Must be developed with an object-oriented programming language
2. Must encrypt data at rest
3. Must comply with corporate PII policies
4. Must support multi-factor authentication
5. Should be built on a trusted OS
Which of the following contractual documents is the correct place to list these requirements when initially
surveying the vendor space?
RFT
A company is deploying smartphones for the mobile workforce. The devices will be used for personal and
business use, but are owned by the organization. Sales personnel will save new customer data via a custom application developed by the company. This information will integrate with the phones’ contact information application storage and populate new records into it. The custom application’s data is encrypted at rest and the connection to the back office is considered secure. The Chief Information Security Officer (CISO) has concerns that the customer contact information might accidentally leak due to the devices’ limited security capabilities and controls planned. What is the MOST effective security control to implement to lower the risk?
Restrict contact information storage data-flow so that it is only shared with the custom application
A vulnerability scanner report shows that a client-server host monitoring solution operating in the credit card corporate environment is managing SSL sessions with a weak algorithm which does not meet corporate policy. Which of the following are true statements? (Select TWO).
The client-server handshake could not negotiate strong ciphers.
The client-server handshake is configured with a wrong priority.
A security manager has received the following email from the disaster recover project manager:
During part of the recent COOP exercise, I determined that we do not have sufficient network performance at
our hot site to support production-level operations. We found that if we scaled down the sensitivity on the WAF, we achieved the requisite level of performance required to support the productivity needs of the organization. Based on the information provided, which of the following would be the MOST appropriate response to this inquiry from the project manager?
If the current configuration at the primary site is working correctly, there may be other issues at the hot site.
An organization is in the process of implementing a SaaS customer relationship system for its bankers. The
SaaS provider supports standards-based authentication integration mechanisms. There are a number of requirements that need to be met as part of the deployment, including:
- The bankers will not need to enter a password to access the system once logged onto the network.
- The access provisioning process into the SaaS system will be part of the authentication request.
- Authorization to the system will be based on existing groups and permissions.
Which of the following MUST be implemented to meet all the above requirements?
OpenID provider
The security administrator is tasked with finding a security product to replace the current anti-spam system in the company. After reading through NIST documents and the OWASP top ten protection guide, the security administrator is now ready to approach vendors. Which of the following types of research documents should the administrator look for? (Select THREE).
RFI, RFQ and RFP
An IT security architect is defining the technology road map for a company. In particular, the security architect is researching and analyzing industry trends in automated transmission of security content. Which of the following would help to evaluate products in this area?
SCAP
Company A is attempting to acquire competitor Company M. Both companies are publicly traded and must adhere to merger acquisition regulations. The two companies are currently awaiting approval from Company M’s board of directors. During this decision process both companies have new products that are soon to be released. With the news of these impending events, company A’s security team is seeing an increase in whaling attacks targeting senior executives. Which of the following can be used to mitigate the risk?
Follow the communications policy for acquisitions
The company’s communications department is taking photos of employees at multiple locations to showcase
the corporate culture. Some of the pictures include data-center facilities. Which of the following sensitive
information should be removed prior to the posting pictures? (Select TWO).
Employee badges and Geotags
A company is seeking to reduce communications costs by implementing BYOD. The security administrator is
concerned that the existing security acceptable use policies will be ignored or ineffective on users’ personal devices. Corporate data on the personal devices must be protected from theft and should only be accessible through certain applications. The BYOD policy, however, allows users to still utilize devices for personal pictures, videos, or games. Which of the following should the security administrator implement to meet the security goals as well as the BYOD policy?
A managed sandbox
Security architects often have to design systems for environments where different stakeholders have competing requirements. In addition to internal influences and competitors, which of the following often has a major effect on mandatory system design features?
Regulatory entities
Routine review of new releases of content for specifications defined within SCAP can assist organizations in gathering and applying intelligence on which of the following types of information? (Select TWO).
Emerging attacks and Software vulnerabilities
A technician is hardening a host that is going to be used as a web application server. The technician is making several registry setting changes to ensure all security events are being logged for review. Two weeks later, the technician gets a report that users are unable to login to the web server. Analyze the following group policies set by the technician:
-Set maximum security file size to 512KB
-Retain security logs is set to 90 days.
-Retention method for security logs is set to not overwrite events
-Retain application logs is set to 14 days
-Set maximum application log size to 1024KB
-Prevent local guest group from accessing application logs is enabled
Which of the following is causing the users’ inability to login to the web server?
Log file size is too small
A new system that will share sensitive information is in the process of being implemented. Two users have
shared ownership of the sensitive data stored within the system and they are performing separate data
classification exercises. Joe’s data classification matrix is shown below:
RECORD TYPE CONFIDENTIALITY INTEGRITY AVAILABILITY
User health record HIGH HIGH MEDIUM
User address HIGH MEDIUM LOW
Ann’s data classification matrix is also shown below:
RECORD TYPE CONFIDENTIALITY INTEGRITY AVAILABILITY
User department LOW LOW LOW
User budget MEDIUM HIGH MEDIUM
User’s supervisor LOW LOW LOW
Given the above information, which of the following is the appropriate individual sensitivity level with respect to CIA and aggregate CIA score which will be applied to the system storing such data?
Confidentiality=HIGH, Integrity=HIGH, Availability=MEDIUM, Aggregate=HIGH
A security architect is designing a series of technical protect, detect, and respond security capabilities with
significant automation potential. One of the objectives is to ensure tools from various vendors can be
implemented and support standardized data exchange. The architect would like to initially select a solution that
supports automated configuration checklists. Which of the following solutions should be selected?
SCAP
A company has reported several web applications are experiencing errors related to unsecure certificates from the web browser. A security consultant discovers Internet-facing web servers, as well as intranet and internal servers, are configured with 1024-bit key lengths. Which of the following will resolve the web browser errors?
New certificates will need to be issued to support 2048-bit RSA key lengths
After a recent breach, a company discovers a web server could not be updated due to incompatibilities with the local legacy database. The chief information officer has decided to implement a design that allows for easier updating of discrete components of the company’s IT infrastructure. Which of the following principles BEST achieves the CIO’s objective? (Select TWO).
Select products developed by established companies and Leverage protocols from RFC documents
A security architect receives a 42-page document of project specifications from the lead developer. According to corporate policy, the message is sent using the PKI system. While the architect is able to read the document,the digital signature has failed validation. The architect calls the developer to see if the document can be sent again. The developer says this happens all the time and the document is probably fine. Which of the following should the architect be concerned about?
The integrity of the document and non-repudiation of the sender are lost without a valid digital signature.