During a recent breach, an attacker was able to get a user's login credentials by cracking a password that was retrieved via a stolen laptop. The attacker accessed the hashed passwords from the hard drive when it was connected to another device. Which of the following security measures could have helped prevent this account from being compromised?
Answer : D
Full Disk Encryption ensures that the data on the laptop is encrypted at rest, preventing unauthorized access even if the device is stolen and its hard drive accessed externally. This aligns with CASP+ objective 3.5, which emphasizes implementing encryption to protect sensitive data against theft and compromise.
PKI can be used to support security requirements in the change management process. Which of the following capabilities does PKI provide for messages?
Answer : A
Non-repudiation ensures that a sender cannot deny having sent a message, achieved through digital signatures provided by PKI. This aligns with CASP+ objective 3.2, emphasizing cryptographic assurance in communication.
A technology company developed an in-house chat application that is used only by developers. An open-source library within the application has been deprecated. The facts below are provided:
The cost of replacing this system is nominal.
The system provides no revenue to the business.
The system is not a critical part of the business.
Which of the following is the best risk mitigation strategy?
Answer : C
Shutting down and migrating to another platform is the most cost-effective and practical option. This avoids risks associated with the deprecated library. This aligns with CASP+ objective 1.3, which emphasizes practical risk mitigation strategies.
A company has a BYOD policy and has configured remote-wiping capabilities to support security requirements. An executive has raised concerns about personal contacts and photos being deleted from personal devices when an employee is terminated. Which of the following is the best way to address these concerns?
Answer : D
Containerization separates corporate data from personal data on BYOD devices. When an employee is terminated, only the corporate container is wiped, preserving personal data. This aligns with CASP+ objective 2.4, which emphasizes securing endpoint devices while respecting privacy.
An organization wants to implement an access control system based on its data classification policy that includes the following data types:
Confidential
Restricted
Internal
Public
The access control system should support SSO federation to map users into groups. Each group should only access systems that process and store data at the classification assigned to the group. Which of the following should the organization implement to enforce its requirements with minimal impact to systems and resources?
Answer : A
Attribute-Based Access Control (ABAC) with a tagging strategy allows flexible and granular access control based on resource classification and user attributes. This minimizes system impact and ensures compliance with data classification policies. This aligns with CASP+ objective 3.4, focusing on advanced access control mechanisms.
A security engineer receives reports through the organization's bug bounty program about remote code execution in a specific component in a custom application. Management wants to properly secure the component and proactively avoid similar issues. Which of the following is the best approach to uncover additional vulnerable paths in the application?
Answer : A
Fuzz testing identifies vulnerabilities by providing unexpected or random input to the application, exposing edge cases and additional attack vectors. This aligns with CASP+ objective 1.5, emphasizing proactive vulnerability discovery techniques in application security.
A security analyst is reviewing the following output from a vulnerability scan of an organization's internet-facing web services:
* Line 06: Hostname sent via SNI does not match certificate.
* Line 10: Certificate not validated by OCSP.
* Line 13: Weak SHA-1 signature algorithm detected.
* Line 17: TLS 1.2 cipher suite negotiated.
* Line 18: SSL session not using forward secrecy.
Which of the following indicates a susceptibility whereby an attacker can take advantage of the trust relationship between the client and the server?
Answer : A
The mismatch between the hostname sent via SNI and the certificate undermines the trust relationship. Attackers can exploit this to conduct man-in-the-middle (MITM) attacks. This aligns with CASP+ objective 1.4, which addresses managing vulnerabilities in secure communication protocols.
________________________________________