Search Header Logo

CASP+ Pre-Assessment

Authored by Timothy Courson

Computers

Professional Development

Used 8+ times

CASP+ Pre-Assessment
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice is an administrator who works in the finance department. She has clicked a link in an email that has executed unwanted actions in a web application she is using. What type of attack is this?

XXS

CSRF

SQLi

Buffer overflow

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are exploring the best option for your organization to move from a physical data center to virtual machines hosted on bare-metal servers. Which of the following is the BEST option for the move?

Type 1 hypervisor

Type 2 hypervisor

iPaaS

IaaS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are looking for a replacement for POP3. Which of the following protocols offers advantages over POP3 for mobile users?

HTTPS

NTP

IMAP

SMTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DNSSEC provides authority and data integrity. DNSSEC will not protect against which of the following?

Spoofing

Kiting/tasting

Verification

Masquerade

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have built an access control list for a router that is subject to PCI DSS. The ACL you have built contains four commands that deny HTTP, POP3, FTP, and Telnet. No traffic is coming through the router. What is the most likely reason?

Traffic is dropped because of the "deny TCP any HTTP" statement.

Traffic is dropped because of the "deny TCP any FTP" statement.

Traffic is accepted but not forwarded to the proper location.

There are no permit statements in the ACL

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are evaluating the security policy of a large enterprise. There are many elements and point of enforcement, including email and remote access systems. XML is the natural choice implemented with XML for a fine-grained, attribute-based access control?

OASIS

SAMLv2

SOAP

XACML

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using Microsoft Network Monitor, you have captured traffic on TCP port 23. Your security policy states that port 23 is not to be used. What client-server protocol is probably running over this port?

SNMP

Telnet

PuTTY

FTP

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?