CASP+ Practice Tests. Nadean H. TannerЧитать онлайн книгу.
RAID 0
93 As a new CISO, you are evaluating controls for integrity. Which set of controls should you choose?RAID 1, classification of data, and load balancingDigital signatures, encryption, and hashesSteganography, ACL, and vulnerability managementChecksum, DOS attacks, and RAID 0
94 As a new CISO, you are evaluating controls for confidentiality. Which set of controls should you choose?RAID 1, classification of data, and load balancingDigital signatures, encryption, and hashesSteganography, ACL, and vulnerability managementChecksum, DOS attacks, and RAID 0
95 You have a web server in your network that is the target of a distributed denial-of-service attack. Multiple systems are flooding the bandwidth of that system. Which information security goal is impacted by this type of an attack?AvailabilityBaselinesIntegrityEmergency response
96 Bob is implementing a new RAID configuration needed for redundancy in the event of disk failure. He has compared standard hardware benchmarks with a week-long baseline of the server to find the assets used the most. What security goal is Bob trying to accomplish?AvailabilityIntegrityConfidentialityDisclosure
97 Because of your facility's geolocation and its propensity for hurricanes, you are tasked with finding another data processing facility to provide you with a location in case of a natural disaster. You are negotiating a contract with an organization with HVAC, power, water, and communication but no hardware. What kind of facility are you building?Hot siteWarm siteMobile siteCold site
98 You are a project manager for an organization that just acquired another company. Your company uses mostly in-house tools, whereas the company you just acquired uses mostly outside vendors. As the project manager, you need to merge these two organizations quickly, have an immediate return on investment (ROI), and retain the ability to customize systems. Each organization thinks their way is the best way. What do you do?Raise the issue with the CEO and board of directors to escalate the decision to outsource all services.Arrange a meeting between all department heads, project managers, and a representative from the board of directors to review requirements and calculate critical functions.Perform a cost-benefit analysis of in-house versus outsourcing and the ROI in-house.Calculate the time to deploy and support the new systems and compare the cost to outsourcing costs. Present the document to upper management for their final decision.
99 Your company experienced a natural disaster, used your hot site for three months, and now is returning to the primary site. What processes should be restored first at the primary site?Finance departmentExternal communicationMission criticalLeast business critical
100 Your organization is in an area susceptible to wildfires. Within the last 30 days, your employees were evacuated twice from the primary location. During the second evacuation, damage occurred to several floors of the building, including the data center. When should the team return to start recovery?In 72 hours.You should not return to the primary location.Immediately after the disaster.Only after it is deemed safe to return to the primary location.
101 Your cyber company has officially grown out of its startup phase and tasked your team with creating a pre-disaster preparation plan that will sustain the business should a disaster, natural or man-made, occur. Which of the following is the most important?Off-site backupsCopies of the BDRMaintaining a warm siteChain of command
102 You are tasked with conducting a risk analysis based on how it affects business processes. What activity are you performing?Gap analysisBusiness disaster recoveryIntrusion detectionBusiness impact analysis
103 Your organization is attempting to make the best use of all the resources allocated to a security project. If your organization is not making the best use of currently held resources, the project may not perform as planned. What type of analysis needs to be done?BDRBIAGapRisk
104 When you look at the business impact analysis given to your office for approval, you notice it is less narrative and more mathematical calculations. What will make this BIA more balanced?More qualitative analysisMore quantitative analysisMore gap analysisMore risk analysis
105 While developing your business continuity plan, your business impact analysis statement should include all but which of the following?Critical areas and dependenciesAll business unitsFinancial losses due to disaster or disruptionRecovery methods and responses
106 You examined your company's disaster recovery plans and are working on the proper response. If your mission-critical processes have an RTO of 36 hours, what would be the best recovery site to have?ServiceWarmHotCold
107 Your company just experienced an emergency and needs to initiate a business continuity plan (BCP). Who is responsible for initiating the BCP?Senior managementSecurity personnelRecovery teamDatabase admins
108 In the past, your global organization tasked individual locations and departments with creating their own separate disaster recovery plans because those employees know best how their organization works. Your new CISO tasked your team with creating a viable plan should your company experience a disaster. What is your mission?Record as many separate plans as necessary.Create one fully integrated business continuity plan.Create separate plans for each geographic location.Keep separate plans for each logical department, regardless of the physical location.
109 As a security architect, you implemented dual firewalls, an IPS, and ACLs. All the files on this network are copied to a tape backup every 24 hours. This backup solution addresses which security tenet?AvailabilityDistributionIntegrityConfidentiality
110 You need to perform a test where a BCP is tested but no actions take place. It needs to be scheduled periodically. Which of the following is the BEST type of test to perform?Full interruption testParallel testStructured walk-throughSimulation test
111 You completed a structured walk-through of your disaster recovery plan. Senior management would like you to use the absolute best way to verify that the DRP is sufficient and has no deficiencies. What test do you choose next?Roundtable exercisesDry-run exercisesFull interruption testExternal audit
112 Over the last month, you reviewed security reports that state there was a significant increase in the number of inappropriate activities on the network by employees. What is the first step in improving the security level in your organization?Awareness sessionsStronger auditingReduce employee permissionsTermination
113 You have been contacted by senior management to conduct an investigation. They suspect that malicious activities are caused by internal personnel and need to know if it is intentional or unintentional. After investigating, you believe it is unintentional and that the most likely cause is which of the following?FraudEspionageEmbezzlementSocial engineering
114 A white-hat penetration test showed your organization to be susceptible to social engineering attacks. One victim in your organization was phished successfully, while another clicked a link in an email and downloaded possible malware. What steps do you take to prevent social engineering in the future?Use IPSec on critical systemsPublish a policy and educate users on risksUse encryptionEstablish KPIs
115 With the rise of malware spread with removable media, your company wrote an amendment to include a ban of all flashcards and memory drives. They pose a threat due to all but which of the following?Physical sizeTransportabilityStorage capacityBeing cheap and easy to use
116 You received final documentation from your compliance audit. They suggested you implement a complementary security tool to work with your firewall to detect any attempt at scanning. Which device do you choose?RASPBXIDSDDT
117 Your company is using a traditional signature-based IDS system, and it seems to have some problems. You and your fellow analysts are seeing more and more false positives. What might be the issue?Anomaly detection requires vast amounts of resources.FIM.Excessive FTP traffic.Poorly written signatures.
118 One of your end users contacted the security administrator because the mouse on his computer seems to be moving all by itself. If your company's focus is confidentiality, which of the following is the best action to take?Delay the intruder.Disconnect the intruder.Record the intruder.Monitor the intruder.
119 You disconnected a computer from the network because of a suspected breach. Which of the following should you do next?Back up all security and audit logs on that computer.Update the security policy.Reimage the machine.Deploy