CompTIA: Advanced Security Practitioner (CASP) Exam Prep - Question List

Select how would you like to study

166. John is a security advisor at his organization. A number of anonymous users are complaining about data being stolen from their computers. Which of the following should he enforce to avoid data theft?
  1. Multi factor authentication
  2. Token authentication
  3. Smart card authentication
  4. No removable-media drives or ports on the computers policy
167. Which of the following terms refers to the process of establishing a standard for security?
  1. Methods research
  2. Security evaluation
  3. Baselining
  4. Hardening
168. David has just switched on his system and opened a word document. Surprisingly, the dialer started dialing the internet. What kind of an attack has probably occurred?
  1. ACK attack
  2. Worm
  3. Logic bomb
  4. Virus
169. David is a Security Administrator at his organization. He is trying to prevent unauthorized access of the corporate wireless network by people passing by. What kind of wireless network threat is he trying to curb?
  1. Man in the middle
  2. Dictionary attack
  3. DNS spoofing
  4. War driving
170. John is investigating a situation where an internal user’s PC has been hacked by another internal user in the organization. Which of the following locations should he check to determine the source of the attack?
  1. The firewall’s logs
  2. Audit logs of the user who has attacked
  3. Domain controller’s logs
  4. Audit logs of the user who has been attacked

Select how would you like to study