CAS-003 문제 191

A company is acquiring incident response and forensic assistance from a managed security service provider in the event of a data breach. The company has selected a partner and must now provide required documents to be reviewed and evaluated. Which of the following documents would BEST protect the company and ensure timely assistance? (Choose two.)

CAS-003 문제 192

A company recently implemented a new cloud storage solution and installed the required synchronization client on all company devices. A few months later, a breach of sensitive data was discovered. Root cause analysis shows the data breach happened from a lost personal mobile device.
Which of the following controls can the organization implement to reduce the risk of similar breaches?

CAS-003 문제 193

Giventhe following output from a security tool in Kali:

CAS-003 문제 194

A security engineer is investigating a compromise that occurred between two internal computers. The engineer has determined during the investigation that one computer infected another. While reviewing the IDS logs, the engineer can view the outbound callback traffic, but sees no traffic between the two computers. Which of the following would BEST address the IDS visibility gap?

CAS-003 문제 195

보안 분석가가 운영자가 재부팅만 허용되어야 하는 시나리오를 해결하고 있습니다.
원격 호스트이지만 다른 활동은 수행하지 않습니다. 분석가는 다음과 같은 다른 부분을 검사합니다.
구성 파일:
구성 파일 1:
연산자 ALL=/sbin/reboot
구성 파일 2:
Command="/sbin/shutdown now", no-x11-forwarding, no-pty, ssh-dss
구성 파일 3:
연산자:x:1000:1000::/home/operator:/bin/bash
다음 중 의도된 작업자가 의도한 작업을 수행할 수 없는 이유를 설명하는 것은 무엇입니까?