Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ac4s65

During a recent security event, access from the non-production environment to the production environment enabled...

During a recent security event, access from the non-production environment to the production environment enabled unauthorized users to install unapproved software and make unplanned configuration changes. During an investigation, the following findings are identified:

• Several new users were added in bulk by the IAM team.

• Additional firewalls and routers were recently added to the network.

• Vulnerability assessments have been disabled for all devices for more than 30 days.

• The application allow list has not been modified in more than two weeks.

• Logs were unavailable for various types of traffic.

• Endpoints have not been patched in more than ten days.

Which of the following actions would most likely need to be taken to ensure proper monitoring is in place within the organization? (Select two)

A.

Disable bulk user creations by the IAM team.

B.

Extend log retention for all security and network devices for 180 days for all traffic.

C.

Review the application allow list on a daily basis to make sure it is properly configured.

D.

Routinely update all endpoints and network devices as soon as new patches/hot fixes are available.

E.

Ensure all network and security devices are sending relevant data to the SIEM.

F.

Configure rules on all firewalls to only allow traffic from the production environment to the non-production environment.

CAS-005 PDF/Engine
  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions
buy now CAS-005 pdf
Get 65% Discount on All Products, Use Coupon: "ac4s65"