CASP EXAM 2025 QUESTIONS AND
ANSWERS
SELinux - ....ANSWER ...-An administrator wants to enable policy based flexible
mandatory access controls on an open
source OS to prevent abnormal application modifications or executions. Which of the
following
would BEST accomplish this?
A. Access control lists
B. SELinux
C. IPtables firewall
D. HIPS
Enable deduplication on the storage pools - ....ANSWER ...-Company ABC's SAN
is nearing capacity, and will cause costly downtimes if servers run out disk
space. Which of the following is a more cost effective alternative to buying a new SAN?
A. Enable multipath to increase availability
...©️ 2025, ALL RIGHTS RESERVED 1
,B. Enable deduplication on the storage pools
C. Implement snapshots to reduce virtual disk size
D. Implement replication to offsite datacenter
Refuse LM and only accept NTLMv2 - ....ANSWER ...-A systems administrator
establishes a CIFS share on a UNIX device to share data to Windows
systems. The security authentication on the Windows domain is set to the highest level.
Windows
users are stating that they cannot authenticate to the UNIX share. Which of the
following settings
on the UNIX server would correct this problem?
A. Refuse LM and only accept NTLMv2
B. Accept only LM
C. Refuse NTLMv2 and accept LM
D. Accept only NTLM
vTPM - ....ANSWER ...-A security architect is designing a new infrastructure using
both type 1 and type 2 virtual
machines. In addition to the normal complement of security controls (e.g. antivirus, host
hardening, HIPS/NIDS) the security architect needs to implement a mechanism to
securely store
...©️ 2025, ALL RIGHTS RESERVED 2
,cryptographic keys used to sign code and code modules on the VMs. Which of the
following will
meet this goal without requiring any hardware pass-through implementations?
A. vTPM
B. HSM
C. TPM
D. INE
Encryption of each individual partition - ....ANSWER ...-A user has a laptop
configured with multiple operating system installations. The operating systems
are all installed on a single SSD, but each has its own partition and logical volume.
Which of the
following is the BEST way to ensure confidentiality of individual operating system data?
A. Encryption of each individual partition
B. Encryption of the SSD at the file level
C. FDE of each logical volume on the SSD
D. FDE of the entire SSD as a single disk
TOCTOU - ....ANSWER ...-After being notified of an issue with the online
shopping cart, where customers are able to
...©️ 2025, ALL RIGHTS RESERVED 3
, arbitrarily change the price of listed items, a programmer analyzes the following piece of
code
used by a web based shopping cart. The programmer found that every time a user adds
an item to the cart, a temporary file is created
on the web server /tmp directory. The temporary file has a name which is generated by
concatenating the content of the $USERINPUT variable and a timestamp in the form of
MM-DDYYYY,
(e.g. smartphone-12-25-2013.tmp) containing the price of the item being purchased.
Which
of the following is MOST likely being exploited to manipulate the price of a shopping
cart's items?
A. Input validation
B. SQL injection
C. TOCTOU
D. Session hijacking
The data may not be in a usable format. - ....ANSWER ...-The administrator is
troubleshooting availability issues on an FCoE-based storage array that uses
deduplication. The single controller in the storage array has failed, so the administrator
wants to
move the drives to a storage array from a different manufacturer in order to access the
data.
...©️ 2025, ALL RIGHTS RESERVED 4
ANSWERS
SELinux - ....ANSWER ...-An administrator wants to enable policy based flexible
mandatory access controls on an open
source OS to prevent abnormal application modifications or executions. Which of the
following
would BEST accomplish this?
A. Access control lists
B. SELinux
C. IPtables firewall
D. HIPS
Enable deduplication on the storage pools - ....ANSWER ...-Company ABC's SAN
is nearing capacity, and will cause costly downtimes if servers run out disk
space. Which of the following is a more cost effective alternative to buying a new SAN?
A. Enable multipath to increase availability
...©️ 2025, ALL RIGHTS RESERVED 1
,B. Enable deduplication on the storage pools
C. Implement snapshots to reduce virtual disk size
D. Implement replication to offsite datacenter
Refuse LM and only accept NTLMv2 - ....ANSWER ...-A systems administrator
establishes a CIFS share on a UNIX device to share data to Windows
systems. The security authentication on the Windows domain is set to the highest level.
Windows
users are stating that they cannot authenticate to the UNIX share. Which of the
following settings
on the UNIX server would correct this problem?
A. Refuse LM and only accept NTLMv2
B. Accept only LM
C. Refuse NTLMv2 and accept LM
D. Accept only NTLM
vTPM - ....ANSWER ...-A security architect is designing a new infrastructure using
both type 1 and type 2 virtual
machines. In addition to the normal complement of security controls (e.g. antivirus, host
hardening, HIPS/NIDS) the security architect needs to implement a mechanism to
securely store
...©️ 2025, ALL RIGHTS RESERVED 2
,cryptographic keys used to sign code and code modules on the VMs. Which of the
following will
meet this goal without requiring any hardware pass-through implementations?
A. vTPM
B. HSM
C. TPM
D. INE
Encryption of each individual partition - ....ANSWER ...-A user has a laptop
configured with multiple operating system installations. The operating systems
are all installed on a single SSD, but each has its own partition and logical volume.
Which of the
following is the BEST way to ensure confidentiality of individual operating system data?
A. Encryption of each individual partition
B. Encryption of the SSD at the file level
C. FDE of each logical volume on the SSD
D. FDE of the entire SSD as a single disk
TOCTOU - ....ANSWER ...-After being notified of an issue with the online
shopping cart, where customers are able to
...©️ 2025, ALL RIGHTS RESERVED 3
, arbitrarily change the price of listed items, a programmer analyzes the following piece of
code
used by a web based shopping cart. The programmer found that every time a user adds
an item to the cart, a temporary file is created
on the web server /tmp directory. The temporary file has a name which is generated by
concatenating the content of the $USERINPUT variable and a timestamp in the form of
MM-DDYYYY,
(e.g. smartphone-12-25-2013.tmp) containing the price of the item being purchased.
Which
of the following is MOST likely being exploited to manipulate the price of a shopping
cart's items?
A. Input validation
B. SQL injection
C. TOCTOU
D. Session hijacking
The data may not be in a usable format. - ....ANSWER ...-The administrator is
troubleshooting availability issues on an FCoE-based storage array that uses
deduplication. The single controller in the storage array has failed, so the administrator
wants to
move the drives to a storage array from a different manufacturer in order to access the
data.
...©️ 2025, ALL RIGHTS RESERVED 4