CAS-003 문제 296

Ann, a member of the finance department at a large corporation, has submitted a suspicious email she
received to the information security team. The team was not expecting an email from Ann, and it contains a
PDF file inside a ZIP compressed archive. The information security learn is not sure which files were
opened. A security team member uses an air-gapped PC to open the ZIP and PDF, and it appears to be a
social engineering attempt to deliver an exploit.
Which of the following would provide greater insight on the potential impact of this attempted attack?

CAS-003 문제 297

A company has issued a new mobile device policy permitting BYOD and company-issued devices. The company-issued device has a managed middleware client that restricts the applications allowed on company devices and provides those that are approved. The middleware client provides configuration standardization for both company owned and BYOD to secure data and communication to the device according to industry best practices. The policy states that, "BYOD clients must meet the company's infrastructure requirements to permit a connection." The company also issues a memorandum separate from the policy, which provides instructions for the purchase, installation, and use of the middleware client on BYOD. Which of the following is being described?

CAS-003 문제 298

신청 A와 관련된 기밀 정보.
애플리케이션 B와 프로젝트 X가 경쟁자에게 유출된 것으로 보입니다. IR팀은 법무팀과 협의 후 가능한 소송 및 형사 고발에 대한 증거를 보존하기 위해 즉각적인 조치를 취하는 것이 좋습니다.
침해와 관련된 데이터의 권한 및 그룹 소유권을 검토하는 동안 IR 팀은 다음 메일 그룹 액세스 목록을 검사합니다.

다음 중 IR 팀이 가장 먼저 취해야 할 조치는 무엇입니까?

CAS-003 문제 299

Company policy requires that all unsupported operating systems be removed from the network. The security administrator is using a combination of network based tools to identify such systems for the purpose of disconnecting them from the network. Which of the following tools, or outputs from the tools in use, can be used to help the security administrator make an approximate determination of the operating system in use on the local company network? (Select THREE).

CAS-003 문제 300

A firewall specialist has been newly assigned to participate in red team exercises and needs to ensure the skills represent real-world threats. Which of the following would be the BEST choice to help the new team member learn bleeding-edge techniques?