CompTIA Advanced Security Practitioner (CASP) Beta Sample Questions:
1. Which technology can be used to help ensure the efficient transport of VoIP traffic?
A) DNS
B) RSTP
C) H.323
D) QoS
2. Resource exhaustion includes all of the following except_____
A) Overflowing a buffer with too much data
B) Allocating all system memory to a single application
C) Opening too many connections
D) Flooding a network with excessive packets
3. What of the following statements is true about voice VLAN?
A) It is used to separate VPN traffic from voice traffic.
B) It is used to separate common user data traffic from HTTP traffic.
C) It is used to separate common user data traffic from voice traffic.
D) It is used to separate common user data traffic from TCP traffic.
4. Which of the following stages are involved in the successful implementation of a collaboration platform? Each correct answer represents a part of the solution. Choose two.
A) Product and service integration
B) Platform implementation
C) Ongoing collaboration solution design
D) Federated identity management
5. What is the goal of a black-box penetration testing?
A) To simulate an external hacking or cyber warfare attack
B) To simulate an attacker who has some knowledge of the organization and its infrastructure
C) To simulate a user to include customizable scripts, additional tools and configurable kernels in personalized distributions
D) To simulate a malicious insider who has some knowledge and possibly basic credentials to the target system
Solutions:
Question # 1 Answer: D | Question # 2 Answer: A | Question # 3 Answer: C | Question # 4 Answer: B,C | Question # 5 Answer: A |