CAS-003 문제 176

An organization relies heavily on third-party mobile applications for official use within a BYOD deployment scheme. An excerpt from an approved text-based-chat client application AndroidManifest.xml is as follows:

Which of the following would restrict application permissions while minimizing the impact to normal device operations?

CAS-003 문제 177

회사 ABC의 SAN이 용량에 가까워지고 있으며 서버에 디스크 공간이 부족하면 비용이 많이 드는 가동 중지 시간이 발생합니다. 다음 중 새 SAN을 구입하는 것보다 비용 효율적인 대안은 무엇입니까?

CAS-003 문제 178

A financial institution's information security officer is working with the risk management officer to determine what to do with the institution's residual risk after all security controls have been implemented. Considering the institution's very low risk tolerance, which of the following strategies would be BEST?

CAS-003 문제 179

An online bank has contracted with a consultant to perform a security assessment of the bank's web portal.
The consultant notices the login page is linked from the main page with HTTPS, but when the URL is changed to HTTP, the browser is automatically redirected back to the HTTPS site. Which of the following is a concern for the consultant, and how can it be mitigated?

CAS-003 문제 180

A security analyst for a bank received an anonymous tip on the external banking website showing the following:
Protocols supported
TLS 1.0
SSL 3
SSL 2
Cipher suites supported
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA-ECDH p256r1
TLS_DHE_RSA_WITH_AES_256_CBC_SHA-DH 1024bit
TLS_RSA_WITH_RC4_128_SHA
TLS_FALLBACK_SCSV non supported
POODLE
Weak PFS
OCSP stapling supported
Which of the following should the analyst use to reproduce these findings comprehensively?