CASP EXAM B 2025 QUESTIONS
AND ANSWERS
Your company hosts several public Web sites on its Web server. Some of the sites
implement the secure sockets layer (SSL) protocol. Which statement is not true of this
protocol? - ....ANSWER ...-SSL operates at the Network layer of the OSI model
You are the security administrator for an organization. Management decides that all
communication on the network should be encrypted using the data encryption standard
(DES) algorithm. Which statement is true of this algorithm? - ....ANSWER ...-A
Triple DES (3DES) algorithm uses 48 rounds of computation
In PKI, what is the entity that signs a certificate? - ....ANSWER ...-An issuer
A new security policy implemented by your organization states that all official e-mail
messages must be signed with digital signatures. Which elements are provided when
these are used? (Choose all that apply) - ....ANSWER ...-
Integrity\n\nAuthentication\n\nNon-repudiation
What type of encryption algorithm does Diffie-Hellman represent? -
....ANSWER ...-Asymmetric with authentication
What is an algorithm that is used to create a message digest for a file? -
....ANSWER ...-Hash
...©️ 2025, ALL RIGHTS RESERVED 1
, Your organization has several virtual LANs (VLANs) implemented. Management is
concerned about the security of the VLANs. Management has requested that you
implement Spanning Tree Protocol (STP) on all VLANs. Which type of attack will this
protect against? - ....ANSWER ...-Network loop attacks
Which of the following statements regarding cloud computing and grid computing are
true? (Choose all that apply) - ....ANSWER ...-Both cloud computing and grid
computing are scalable\n\nCloud computing may be more environmentally friendly
than grid computing\n\nCloud computing is made up of thin clients, grid computing,
and utility computing
The LAN in your organization uses a SAN to store data. You have just connected a new
drive to the SAN and created a logical drive using the RAID controller. It is important
that visibility of the new storage be restricted to a few servers in the SAN Which two
options can you use to achieve this? (Choose two) - ....ANSWER ...-Use zoning on
the fibre channel switch\n\nUse LUN masking on the RAID controller
What should you implementto isolate two of the devices that are located on a SAN fabric
containing eight devices? - ....ANSWER ...-Virtual SAN
Your organization has implemented Web Services Security (WS-Security) in all its Web
applications. What is not provided with this Simple Object Access Protocol (SOAP)
extension? - ....ANSWER ...-Availability
Which type of firewall most detrimentally affects network performance? -
....ANSWER ...-Application-level proxy firewall
You have several routers on your organization's network. Recently, one of the routers has
undergone a spoofing attack. Management wants you to protect against these spoofing
...©️ 2025, ALL RIGHTS RESERVED 2
AND ANSWERS
Your company hosts several public Web sites on its Web server. Some of the sites
implement the secure sockets layer (SSL) protocol. Which statement is not true of this
protocol? - ....ANSWER ...-SSL operates at the Network layer of the OSI model
You are the security administrator for an organization. Management decides that all
communication on the network should be encrypted using the data encryption standard
(DES) algorithm. Which statement is true of this algorithm? - ....ANSWER ...-A
Triple DES (3DES) algorithm uses 48 rounds of computation
In PKI, what is the entity that signs a certificate? - ....ANSWER ...-An issuer
A new security policy implemented by your organization states that all official e-mail
messages must be signed with digital signatures. Which elements are provided when
these are used? (Choose all that apply) - ....ANSWER ...-
Integrity\n\nAuthentication\n\nNon-repudiation
What type of encryption algorithm does Diffie-Hellman represent? -
....ANSWER ...-Asymmetric with authentication
What is an algorithm that is used to create a message digest for a file? -
....ANSWER ...-Hash
...©️ 2025, ALL RIGHTS RESERVED 1
, Your organization has several virtual LANs (VLANs) implemented. Management is
concerned about the security of the VLANs. Management has requested that you
implement Spanning Tree Protocol (STP) on all VLANs. Which type of attack will this
protect against? - ....ANSWER ...-Network loop attacks
Which of the following statements regarding cloud computing and grid computing are
true? (Choose all that apply) - ....ANSWER ...-Both cloud computing and grid
computing are scalable\n\nCloud computing may be more environmentally friendly
than grid computing\n\nCloud computing is made up of thin clients, grid computing,
and utility computing
The LAN in your organization uses a SAN to store data. You have just connected a new
drive to the SAN and created a logical drive using the RAID controller. It is important
that visibility of the new storage be restricted to a few servers in the SAN Which two
options can you use to achieve this? (Choose two) - ....ANSWER ...-Use zoning on
the fibre channel switch\n\nUse LUN masking on the RAID controller
What should you implementto isolate two of the devices that are located on a SAN fabric
containing eight devices? - ....ANSWER ...-Virtual SAN
Your organization has implemented Web Services Security (WS-Security) in all its Web
applications. What is not provided with this Simple Object Access Protocol (SOAP)
extension? - ....ANSWER ...-Availability
Which type of firewall most detrimentally affects network performance? -
....ANSWER ...-Application-level proxy firewall
You have several routers on your organization's network. Recently, one of the routers has
undergone a spoofing attack. Management wants you to protect against these spoofing
...©️ 2025, ALL RIGHTS RESERVED 2