CompTIA: Advanced Security Practitioner (CASP) Exam Prep - Question List

Select how would you like to study

26. David is a Security Administrator at his organization. He is trying to prevent unauthorized access of the corporate wireless network by people passing by. What kind of wireless network threat is he trying to curb?
  1. Man in the middle
  2. Dictionary attack
  3. DNS spoofing
  4. War driving
27. John is a Network Security Administrator at his organization. The company plans to establish secure connections between the company’s headquarters and branch offices. Which of the following protocols should be used to configure the router?
  1. FTP protocol
  2. IPSec protocol in Tunnel mode
  3. IPSec protocol in Transport mode
  4. SSH protocol
28. Ryan is inserting data inside of an ICMP packet to communicate to an already comprised system. What is Ryan doing?
  1. Resolution Attack
  2. Loki Attack
  3. Backdoor Entering
  4. Data Swiping
29. Which method(s) of risk analysis have both pros and cons attached?
  1. Quantitative
  2. Qualitative
  3. Stringent
  4. A and B
30. What is the imaginary boundary that divides the trusted from the un-trusted components?
  1. Security Static
  2. Static Boundary
  3. Random Access Memory
  4. Security Perimeter

Select how would you like to study