Book Image

CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003 - Third Edition

By : Jeff T. Parker, Michael Gregg
Book Image

CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003 - Third Edition

By: Jeff T. Parker, Michael Gregg

Overview of this book

The next few years will bring a 45-fold increase in digital data and at least one-third of that data will pass through the cloud. The level of risk to data everywhere is growing in parallel and organizations are in need of qualified data security professionals to safeguard their information. The CASP+ certification validates this in-demand skillset and this book is your ideal resource for passing the exam. CASP+ meets the ISO 17024 standard and is approved by the U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is also compliant with government regulations under the Federal Information Security Management Act (FISMA). As such, this career-building credential makes you in demand in the marketplace and shows that you are qualified to address enterprise-level security concerns. The CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, Third Edition, is the preparation resource you need to take the next big step for your career and pass with flying colors. This book provides detailed explanations of technical and business concepts that give you the background you need to apply, identify, and implement appropriate security solutions. You’ll solidify your understanding of each objective with end-of-chapter reviews. The book contains hands-on lab exercises and hundreds of practice questions to help you test your knowledge in advance of the exam. By the end of the book, you’ll have the knowledge and the confidence to ace the CASP+ certification exam.
Table of Contents (22 chapters)
Free Chapter
1
Cover
2
Acknowledgments
3
About the Authors
4
Table of Exercises
6
Assessment Test
7
Answers to Assessment Test
18
Index
19
Advert
20
End User License Agreement

Review Questions

You can find the answers in Appendix A.

  1. Which of the following is an example of a well-known open-source IDS tool?

    1. Nessus
    2. Snort
    3. Netcat
    4. Hping
  2. John the Ripper is used for which of the following?

    1. Remote listener
    2. Wireless security
    3. Packer analysis
    4. Password cracking
  3. Which of the following is used to complete a scan by performing all three steps of the TCP session startup?

    1. Nmap -sS
    2. Nmap -sT
    3. Nmap -sU
    4. Nmap -O
  4. You have been asked to find a replacement for Telnet and want to use a secure protocol for data exchange. Which of the following applications would be acceptable?

    1. WebGoat
    2. Nessus
    3. PuTTY
    4. Helix
  5. Which of the following is considered a framework for information security and addresses issues such as governance, systems development life cycles, security assessments, risk management, and incident response?

    1. ISO 2701
    2. RFC 2196
    3. COBIT
    4. NIST 800-100
  6. A ______________ points to a statement in a policy or procedure by which to determine a course of action.

    1. Procedure...