CAS-003 문제 246
An infrastructure team is at the end of a procurement process and has selected a vendor. As part of the final negotiations, there are a number of outstanding issues, including:
1. Indemnity clauses have identified the maximum liability
2. The data will be hosted and managed outside of the company's
geographical location
The number of users accessing the system will be small, and no sensitive data will be hosted in the solution. As the security consultant on the project, which of the following should the project's security consultant recommend as the NEXT step?
1. Indemnity clauses have identified the maximum liability
2. The data will be hosted and managed outside of the company's
geographical location
The number of users accessing the system will be small, and no sensitive data will be hosted in the solution. As the security consultant on the project, which of the following should the project's security consultant recommend as the NEXT step?
CAS-003 문제 247
A security engineer at a company is designing a system to mitigate recent setbacks caused competitors that are beating the company to market with the new products. Several of the products incorporate propriety enhancements developed by the engineer's company. The network already includes a SEIM and a NIPS and requires 2FA for all user access. Which of the following system should the engineer consider NEXT to mitigate the associated risks?
CAS-003 문제 248
An organization is selecting a SaaS provider to replace its legacy, in house Customer Resource Management (CRM) application. Which of the following ensures the organization mitigates the risk of managing separate user credentials?
CAS-003 문제 249
사고 대응자는 포렌식 목적으로 실행 중인 시스템에서 휘발성 메모리를 포괄적으로 캡처하려고 합니다. 머신은 Linux OS의 최신 릴리스를 실행하고 있습니다.
다음 중 이 캡처를 수행하는 가장 실현 가능한 방법은 무엇입니까?
다음 중 이 캡처를 수행하는 가장 실현 가능한 방법은 무엇입니까?
CAS-003 문제 250
An organization's network engineering team recently deployed a new software encryption solution to ensure the confidentiality of data at rest, which was found to add 300ms of latency to data read-write requests in storage, impacting business operations.
Which of the following alternative approaches would BEST address performance requirements while meeting the intended security objective?
Which of the following alternative approaches would BEST address performance requirements while meeting the intended security objective?