Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA CASP+ 2023 Questions and answer - Part 60

Mary Smith

Sun, 19 Apr 2026

ComptiA CASP+ 2023 Questions and answer - Part 60

1. Your company is planning to procure a web conferencing system to cut costs on travel. You have been asked to investigate thesecurity issues that should be considered during this process. Which of the following is not an issue to consider?

A) The potential for the solution to affect network performance
B) The dangers of data being stored on a vendor - s shared server
C) The possibility of information being captured duringtransmission
D) Preventing uninvited guests at meetings



2. Which single sign-on system is used in both UNIX and Microsoft Active Directory?

A) WAYF
B) Kerberos
C) OpenID
D) Shibboleth



3. In which attack does the attacker leave the VM - s normally isolated state and interact directly with the hypervisor?

A) VMEscape
B) XSS
C) cross violation
D) CSRF



4. Which of the following statements regarding the security requirements and responsibilities for personnel is true?

A) All personnel within an organization have some level ofsecurity requirements & responsibilities.
B) Although executive management is responsible for leadingany security initiative, executive management is exemptfrom most of the security requirements & responsibilities.
C) Only management and senior staff have securityrequirements & responsibilities.
D) Only the physical security manager should be concernedwith the organization - s physical security.



5. Which of the following is not an advantage of virtualization?

A) ability to quickly bring up a replica server in the event of lossof the primary server
B) reduced overall use of power in the data center
C) better security
D) dynamic allocation of memory and CPU resources to theservers



1. Right Answer: A
Explanation: While network performance may be a consideration in the selection of a product, it is the only issue listed here that is not a security issue.

2. Right Answer: B
Explanation: AD uses the same authentication and authorization system used in UNIX: Kerberos. This system authenticates a user once and then, through the use of a ticket system, allows the user to perform all actions and access all resources to which he has been given permission without the need to authenticate again.

3. Right Answer: A
Explanation: In a VMEscape attack, the attacker breaks out of a VM s normally isolated state and interacts directly with the hypervisor. Since VMs often share the same physical resources, if the attacker can discover how his VM s virtual resources map to the physical resources, he will be able to conduct attacks directly on the real physical resources.

4. Right Answer: A
Explanation: All personnel within an organization will have some level of security requirements & responsibilities.

5. Right Answer: C
Explanation: The same security issues that must be mitigated in the physical environment must also be addressed in the virtual network.

0 Comments

Leave a comment