CAS-003 문제 426
To meet a SLA, which of the following document should be drafted, defining the company's internal interdependent unit responsibilities and delivery timelines.
CAS-003 문제 427
A large company with a very complex IT environment is considering a move from an on-premises, internally managed proxy to a cloud-based proxy solution managed by an external vendor. The current proxy provides caching, content filtering, malware analysis, and URL categorization for all staff connected behind the proxy.
Staff members connect directly to the Internet outside of the corporate network. The cloud-based version of the solution would provide content filtering, TLS decryption, malware analysis, and URL categorization. After migrating to the cloud solution, all internal proxies would be decommissioned. Which of the following would MOST likely change the company's risk profile?
Staff members connect directly to the Internet outside of the corporate network. The cloud-based version of the solution would provide content filtering, TLS decryption, malware analysis, and URL categorization. After migrating to the cloud solution, all internal proxies would be decommissioned. Which of the following would MOST likely change the company's risk profile?
CAS-003 문제 428
As part of the development process for a new system, the organization plans to perform requirements analysis and risk assessment. The new system will replace a legacy system, which the organization has used to perform data analytics. Which of the following is MOST likely to be part of the activities conducted by management during this phase of the project?
CAS-003 문제 429
시스템 현대화 프로그램의 일환으로 약한 암호화 알고리즘의 사용이 식별됩니다. ma wet se-vices API API를 사용하는 클라이언트는 보안 알고리즘 세트의 사용을 지원하는 시스템을 자체적으로 업그레이드할 수 없습니다. 임시로 해결 방법 클라이언트가 IP 공간을 제공하고 네트워크 관리자가 ACL을 통해 API에 대한 액세스를 클라이언트가 보유한 IP 공간으로만 제한합니다. 다음 중 이 상황에서 ACL을 사용한 예는 무엇입니까?
CAS-003 문제 430
The network administrator at an enterprise reported a large data leak. One compromised server was used to aggregate data from several critical application servers and send it out to the Internet using HTTPS. Upon investigation, there have been no user logins over the previous week and the endpoint protection software is not reporting any issues. Which of the following BEST provides insight into where the compromised server collected the information?