CAS-003 문제 141
A security administrator is hardening a TrustedSolaris server that processes sensitive data.
The data owner has established the following security requirements:
* The data is for internal consumption only and shall not be distributed to outside individuals
* The systems administrator should not have access to the data processed by the server
* The integrity of the kernel image is maintained
Which of the following host-based security controls BEST enforce the data owner's requirements? (Choose three.)
The data owner has established the following security requirements:
* The data is for internal consumption only and shall not be distributed to outside individuals
* The systems administrator should not have access to the data processed by the server
* The integrity of the kernel image is maintained
Which of the following host-based security controls BEST enforce the data owner's requirements? (Choose three.)
CAS-003 문제 142
The Chief Information Officer (CIO) asks the systems administrator to improve email security at the company based on the following requirements:
1. Do not use two-factor authentication.
2. Protect the contents of a user's mailbox.
3. Be able to sign emails digitally.
4. Protect internal users from spoofing.
5. Secure communications in transit.
6. Use a hierarchically validated certifier for key exchange.
7. Do not use additional plug-in.
8. Have minimal impact to the end-user experience.
Which of the following, when used together, should the systems administrator implement to BEST meet the objectives? (Select TWO).
1. Do not use two-factor authentication.
2. Protect the contents of a user's mailbox.
3. Be able to sign emails digitally.
4. Protect internal users from spoofing.
5. Secure communications in transit.
6. Use a hierarchically validated certifier for key exchange.
7. Do not use additional plug-in.
8. Have minimal impact to the end-user experience.
Which of the following, when used together, should the systems administrator implement to BEST meet the objectives? (Select TWO).
CAS-003 문제 143
A large company with a very complex IT environment is considering a move from an on-premises, internally managed proxy to a cloud-based proxy solution managed by an external vendor. The current proxy provides caching, content filtering, malware analysis, and URL categorization for all staff connected behind the proxy. Staff members connect directly to the Internet outside of the corporate network. The cloud-based version of the solution would provide content filtering, TLS decryption, malware analysis, and URL categorization. After migrating to the cloud solution, all internal proxies would be decommissioned. Which of the following would MOST likely change the company's risk profile?
CAS-003 문제 144
After several industry competitors suffered data loss as a result of cyberattacks, the Chief Operating Officer (COO) of a company reached out to the information security manager to review the organization's security stance. As a result of the discussion, the COO wants the organization to meet the following criteria:
* Blocking of suspicious websites
* Prevention of attacks based on threat intelligence
* Reduction in spam
* Identity-based reporting to meet regulatory compliance
* Prevention of viruses based on signature
* Protect applications from web-based threats
Which of the following would be the BEST recommendation the information security manager could make?
* Blocking of suspicious websites
* Prevention of attacks based on threat intelligence
* Reduction in spam
* Identity-based reporting to meet regulatory compliance
* Prevention of viruses based on signature
* Protect applications from web-based threats
Which of the following would be the BEST recommendation the information security manager could make?
CAS-003 문제 145
The risk subcommittee of a corporate board typically maintains a master register of the most prominent risks to the company. A centralized holistic view of risk is particularly important to the corporate Chief Information Security Officer (CISO) because: