Chapter 1 Designing Secure ArchitectureCASP Mark B Flashcards
Which is the security module that would store an e-commerce servers private key?
A. DLP
B. HSM
C. DPI
D. 802.1x
B. HSM
How can I mitigate the threat of data leakage?
A. Through DLP
B. Through HSM
C. Through DPI
D. Through 802.1x
A. Through DLP
What type of IDS would I be using if I needed to update my definition files?
A. Anomaly
B. Behavior
C. Heuristics
D. Signature
D. Signature
What is the purpose of iptables on a host computer?
A. Routing
B. Firewall
C. Switching
D. Encryption
B. Firewall
Which protocol would be used to manage a router securely from a technicians laptop?
A. Telnet
B. RDP
C. SSH
D. FTP
C. SSH
Explanation:
How should I protect my management interface on a switch when I need to configure it remotely?
A. OSPF
B. OOB Management
C. Strong Password
D. RIP v2
B. OOB Management
C. Strong Password
What is an Ethernet standard for port access protocol, used for protecting networks via authentication?
A. 802.11
B. 802.3
C. 802.1x
D. 802.5
C. 802.1x
What type of connectivity will allow key personnel to maintain communication with one another and key network resources when the main network is under attack?
A. Email
B. OOB
C. Teams
D. VNC
B. OOB
What is a disadvantage when using a virtual desktop infrastructure (VDI)?
A. Reliance on networks
B. Better use of hardware resources
C. Enhanced security
D. Standard operating environment (SOE)
A. Reliance on networks
What is used when my contractors use a tablet or thin client to access a Windows 10 desktop in my data center?
A. OOB
B. MDM
C. VDI
D. SSH
C. VDI
What type of routing will help to mitigate a DDoS attack?
A. OSPF
B.RTBH
C. RIP
D. EIGRP
B.RTBH
What is it when SOC staff are failing to respond to alerts due to excessive levels of alerts?
A. False positive
B. Alert fatigue
C. False negative
D. True positive
B. Alert fatigue
Explanation:
What will I need to support on my network device in order to forward truncated network traffic to a network monitoring tool?
A. Netflow
B. sFlow
C. SIEM
D. System Logging Protocol (Syslog)
B. sFlow
What type of security would I use on my layer 2 switch to isolate the finance network from the development network?
A. VPN
B. IPSec
C. VLAN
D. RTBH
C. VLAN
Explanation:
What type of servers would the security team place on the DMZ network?
A. Web Application Server
B. SMTP Gateway
C. Intranet File Server
D. Finance Department Payroll Server
A. Web Application Server
B. SMTP Gateway