CAS-003 문제 156

A breach was caused by an insider threat in which customer PII was compromised.
Following the breach, a lead security analyst is asked to determine which vulnerabilities the attacker used to access company resources. Which of the following should the analyst use to remediate the vulnerabilities?

CAS-003 문제 157

A completely new class of web-based vulnerabilities has been discovered. Claims have been made that all common web-based development frameworks are susceptible to attack. Proof-of- concept details have emerged on the Internet. A security advisor within a company has been asked to provide recommendations on how to respond quickly to these vulnerabilities. Which of the following BEST describes how the security advisor should respond?

CAS-003 문제 158

An infrastructure team is at the end of a procurement process and has selected a vendor.
As part of the final negotiations, there are a number of outstanding issues, including:
1. Indemnity clauses have identified the maximum liability
2. The data will be hosted and managed outside of the company's geographical location The number of users accessing the system will be small, and no sensitive data will be hosted in the solution. As the security consultant on the project, which of the following should the project's security consultant recommend as the NEXT step?

CAS-003 문제 159

보안 관리자가 회사 소유 모바일 장치를 강화하기 위한 제어를 구현하려고 합니다.
회사 정책은 다음 요구 사항을 지정합니다.
- 필수 접근 제어는 OS에 의해 시행되어야 합니다.
- 장치는 이동통신사 데이터 전송만 사용해야 합니다.
다음 중 보안 관리자가 구현해야 하는 제어는 무엇입니까? (3개 선택).

CAS-003 문제 160

A company has hired an external security consultant to conduct a thorough review of all aspects of corporate security. The company is particularly concerned about unauthorized access to its physical offices resulting in network compromises. Which of the following should the consultant recommend be performed to evaluate potential risks?