CASP BOOK TEST 2025 QUESTIONS
ANSWERS
Advanced persistent threat attacks are characterized by which of the following -
....ANSWER ...-1) One of their main focuses is to maintain a way back into
machines. 2) Their primary objective is to quietly obtain information.
Smart enterprises know that antimalware companies cannot discover all malware. In an
effort to discover some malware on their own, which of the following is performed by
organizations - ....ANSWER ...-Malware sandboxing
To protect application servers from network-based attacks, _______________ can act
based on the content of traffic bound for the specific host - ....ANSWER ...-Host-
based application firewalls
Your company is being sued by a former programmer and your boss has announced that
lawyers will be contacting people soon for detailed statements. What is the first step of
the process that should be invoked to manage the responsibilities -
....ANSWER ...-Litigation hold
Which of the following categories of standards is considered official -
....ANSWER ...-De jure standards
Which of the following box test types is best for simulating a malicious administrator
attacking the organization - ....ANSWER ...-White box test
...©️ 2025, ALL RIGHTS RESERVED 1
, Hackers frequently attack switches through VLAN-hopping methods. Which of the
following are common varieties of this attack - ....ANSWER ...-1) Switch spoofing
2) Double tagging
You are streaming web conference content from your web servers to multiple endpoints.
Because of the sensitive nature of the content, encryption is mandated. What would be
the preferred algorithm - ....ANSWER ...-RC4
Your IDS indicates that your SSL sessions are under attack from SSL-based exploits.
Your web servers are all Apache on Linux, and you do encryption at the web server.
What is your best mitigation strategy - ....ANSWER ...-Verify in
/etc/httpd/conf.d/ssl.conf that SSL is disabled and TLS is enabled.
Refer to the exhibit. As the security practitioner for the Example corporation, you are
concerned about unauthorized devices connecting to the Cisco switch. You decide to
implement port security on the Cisco switch for Fast Ethernet port 0/1. You input a
series of Cisco IOS commands into the switch to ensure that only a handful of devices
are allowed to connect to the port. However, you receive an error message. Based on the
exhibit, which line of code is incorrect - ....ANSWER ...-Switch(config-if)#
switchport port-security mac-address cccc.aaaa.bbbb
What is the first step in a risk management process - ....ANSWER ...-The
enumeration of specific risks
The ABC organization is looking to produce a hybrid cloud by integrating their on-
premises Active Directory with Microsoft Azure Active Directory. Prior to doing so, they
must perform a process of identifying, assessing, analyzing, and mitigating any risks
...©️ 2025, ALL RIGHTS RESERVED 2
ANSWERS
Advanced persistent threat attacks are characterized by which of the following -
....ANSWER ...-1) One of their main focuses is to maintain a way back into
machines. 2) Their primary objective is to quietly obtain information.
Smart enterprises know that antimalware companies cannot discover all malware. In an
effort to discover some malware on their own, which of the following is performed by
organizations - ....ANSWER ...-Malware sandboxing
To protect application servers from network-based attacks, _______________ can act
based on the content of traffic bound for the specific host - ....ANSWER ...-Host-
based application firewalls
Your company is being sued by a former programmer and your boss has announced that
lawyers will be contacting people soon for detailed statements. What is the first step of
the process that should be invoked to manage the responsibilities -
....ANSWER ...-Litigation hold
Which of the following categories of standards is considered official -
....ANSWER ...-De jure standards
Which of the following box test types is best for simulating a malicious administrator
attacking the organization - ....ANSWER ...-White box test
...©️ 2025, ALL RIGHTS RESERVED 1
, Hackers frequently attack switches through VLAN-hopping methods. Which of the
following are common varieties of this attack - ....ANSWER ...-1) Switch spoofing
2) Double tagging
You are streaming web conference content from your web servers to multiple endpoints.
Because of the sensitive nature of the content, encryption is mandated. What would be
the preferred algorithm - ....ANSWER ...-RC4
Your IDS indicates that your SSL sessions are under attack from SSL-based exploits.
Your web servers are all Apache on Linux, and you do encryption at the web server.
What is your best mitigation strategy - ....ANSWER ...-Verify in
/etc/httpd/conf.d/ssl.conf that SSL is disabled and TLS is enabled.
Refer to the exhibit. As the security practitioner for the Example corporation, you are
concerned about unauthorized devices connecting to the Cisco switch. You decide to
implement port security on the Cisco switch for Fast Ethernet port 0/1. You input a
series of Cisco IOS commands into the switch to ensure that only a handful of devices
are allowed to connect to the port. However, you receive an error message. Based on the
exhibit, which line of code is incorrect - ....ANSWER ...-Switch(config-if)#
switchport port-security mac-address cccc.aaaa.bbbb
What is the first step in a risk management process - ....ANSWER ...-The
enumeration of specific risks
The ABC organization is looking to produce a hybrid cloud by integrating their on-
premises Active Directory with Microsoft Azure Active Directory. Prior to doing so, they
must perform a process of identifying, assessing, analyzing, and mitigating any risks
...©️ 2025, ALL RIGHTS RESERVED 2