Chapter 1 Designing Secure ArchitectureCASP Mark B Flashcards

1
Q

Which is the security module that would store an e-commerce servers private key?

A. DLP
B. HSM
C. DPI
D. 802.1x

A

B. HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can I mitigate the threat of data leakage?

A. Through DLP
B. Through HSM
C. Through DPI
D. Through 802.1x

A

A. Through DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of IDS would I be using if I needed to update my definition files?

A. Anomaly
B. Behavior
C. Heuristics
D. Signature

A

D. Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of iptables on a host computer?

A. Routing
B. Firewall
C. Switching
D. Encryption

A

B. Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which protocol would be used to manage a router securely from a technicians laptop?

A. Telnet
B. RDP
C. SSH
D. FTP

A

C. SSH

Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How should I protect my management interface on a switch when I need to configure it remotely?

A. OSPF
B. OOB Management
C. Strong Password
D. RIP v2

A

B. OOB Management
C. Strong Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Ethernet standard for port access protocol, used for protecting networks via authentication?

A. 802.11
B. 802.3
C. 802.1x
D. 802.5

A

C. 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of connectivity will allow key personnel to maintain communication with one another and key network resources when the main network is under attack?

A. Email
B. OOB
C. Teams
D. VNC

A

B. OOB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a disadvantage when using a virtual desktop infrastructure (VDI)?

A. Reliance on networks
B. Better use of hardware resources
C. Enhanced security
D. Standard operating environment (SOE)

A

A. Reliance on networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is used when my contractors use a tablet or thin client to access a Windows 10 desktop in my data center?

A. OOB
B. MDM
C. VDI
D. SSH

A

C. VDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of routing will help to mitigate a DDoS attack?
A. OSPF
B.RTBH
C. RIP
D. EIGRP

A

B.RTBH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is it when SOC staff are failing to respond to alerts due to excessive levels of alerts?

A. False positive
B. Alert fatigue
C. False negative
D. True positive

A

B. Alert fatigue

Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What will I need to support on my network device in order to forward truncated network traffic to a network monitoring tool?

A. Netflow
B. sFlow
C. SIEM
D. System Logging Protocol (Syslog)

A

B. sFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of security would I use on my layer 2 switch to isolate the finance network from the development network?

A. VPN
B. IPSec
C. VLAN
D. RTBH

A

C. VLAN

Explanation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of servers would the security team place on the DMZ network?

A. Web Application Server
B. SMTP Gateway
C. Intranet File Server
D. Finance Department Payroll Server

A

A. Web Application Server
B. SMTP Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of security label would CISA assign to the chemical sector and communications sector?

A. Regulated industry
B. Protected Infrastructure
C. SCADA
D. Critical Infrastructure

A

D. Critical Infrastructure

17
Q

What will protect my WiFi network against common threats, including evil twin/rogue APs and DDoS?

A. 802.1x
B. Host based IPS (HIPS)
C. Firewall
D. WIPS

A

D. WIPS

18
Q

What should I configure on mobile users’ laptop computers to ensure they will not be vulnerable to sniffing/eavesdropping when accessing the hostels WiFi network?

A. Antimalware
B. Shielding
C. Cable locks
D. VPN

A

D. VPN

Explanation:

19
Q

Which edge security appliance should be recommended for an organization that has no dedicated security team and needs multiple security protection functions?

A. Router
B. WAF
C. UTM
D. DLP

A

C. UTM

20
Q

What should be used to connect to a remote government agency across public networks?

A. VPN
B. HAIPE
C. VLAN
D. Protected distribution

A

B. HAIPE (High Assurance Internet Protocol Encryptor)