CAS-003 문제 261
A storage as a service company implements both encryption at rest as well as encryption in transit of customers' data. The security administrator is concerned with the overall security of the encrypted customer data stored by the company servers and wants the development team to implement a solution that will strengthen the customer's encryption key. Which of the following, if implemented, will MOST increase the time an offline password attack against the customers' data would take?
CAS-003 문제 262
An attacker wants to gain information about a company's database structure by probing the database listener. The attacker tries to manipulate the company's database to see if it has any vulnerabilities that can be exploited to help carry out an attack. To prevent this type of attack, which of the following should the company do to secure its database?
CAS-003 문제 263
Which of the following is the GREATEST security concern with respect to BYOD?
CAS-003 문제 264
The security configuration management policy states that all patches must undergo testing procedures before being moved into production. The security analyst notices a single web application server has been downloading and applying patches during non-business hours without testing. There are no apparent adverse reactions, server functionality does not seem to be affected, and no malware was found after a scan.
Which of the following actions should the analyst take?
Which of the following actions should the analyst take?
CAS-003 문제 265
A Chief Security Officer (CSO) is reviewing the organization's incident response report from a recent
incident. The details of the event indicate:
1. A user received a phishing email that appeared to be a report from the organization's CRM tool.
2. The user attempted to access the CRM tool via a fraudulent web page but was unable to access the
tool.
3. The user, unaware of the compromised account, did not report the incident and continued to use the
CRM tool with the original credentials.
4. Several weeks later, the user reported anomalous activity within the CRM tool.
5. Following an investigation, it was determined the account was compromised and an attacker in another
country has gained access to the CRM tool.
6. Following identification of corrupted data and successful recovery from the incident, a lessons learned
activity was to be led by the CSO.
Which of the following would MOST likely have allowed the user to more quickly identify the unauthorized
use of credentials by the attacker?
incident. The details of the event indicate:
1. A user received a phishing email that appeared to be a report from the organization's CRM tool.
2. The user attempted to access the CRM tool via a fraudulent web page but was unable to access the
tool.
3. The user, unaware of the compromised account, did not report the incident and continued to use the
CRM tool with the original credentials.
4. Several weeks later, the user reported anomalous activity within the CRM tool.
5. Following an investigation, it was determined the account was compromised and an attacker in another
country has gained access to the CRM tool.
6. Following identification of corrupted data and successful recovery from the incident, a lessons learned
activity was to be led by the CSO.
Which of the following would MOST likely have allowed the user to more quickly identify the unauthorized
use of credentials by the attacker?