An organization mat provides a SaaS solution recently experienced an incident involving customer data loss. The system has a level of sell-healing that includes monitoring performance and available resources. When me system detects an issue, the self-healing process is supposed to restart pans of me software.
During the incident, when me self-healing system attempted to restart the services, available disk space on the data drive to restart all the services was inadequate. The self-healing system did not detect that some services did not fully restart and declared me system as fully operational. Which of the following BEST describes me reason why the silent failure occurred?
The information security manager at a 24-hour manufacturing facility is reviewing a contract for potential risks to the organization. The contract pertains to the support of printers and multifunction devices during non-standard business hours. Which of the following will the security manager most likely identify as a risk?
A non-disclosure agreement (NDA) is crucial when external parties are provided access to sensitive company devices or information. The absence of an NDA poses a risk that confidential information could be disclosed by the service provider. Therefore, ensuring an NDA is in place with the company that supports sensitive devices would be a key risk identified in the contract.
A security analyst and a DevOps engineer are working together to address configuration drifts in highly scalable systems that are leading to increased vulnerability findings. Which of the following recommendations would be best to eliminate this issue?
Immutable infrastructure through containers ensures that the deployed systems remain consistent and resistant to drift. Any changes require rebuilding and redeploying containers, eliminating configuration inconsistencies. This aligns with CASP+ objective 2.2, which emphasizes implementing scalable, secure system configurations.
________________________________________
A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.
The technician will define this threat as:
An advanced persistent threat (APT) is a type of cyberattack that involves a stealthy and continuous process of compromising and exploiting a target system or network. An APT typically has a specific goal or objective, such as stealing sensitive data, disrupting operations, or sabotaging infrastructure. An APT can use various techniques to evade detection and maintain persistence, such as encryption, proxy servers, malware, etc. The scenario described in the question matches the characteristics of an APT. Reference: https://www.cisco.com/c/en/us/products/security/what-is-apt.html https://www.imperva.com/learn/application-security/advanced-persistent-threat-apt/
During a recent breach, an attacker was able to get a user's login credentials by cracking a password that was retrieved via a stolen laptop. The attacker accessed the hashed passwords from the hard drive when it was connected to another device. Which of the following security measures could have helped prevent this account from being compromised?
Full Disk Encryption ensures that the data on the laptop is encrypted at rest, preventing unauthorized access even if the device is stolen and its hard drive accessed externally. This aligns with CASP+ objective 3.5, which emphasizes implementing encryption to protect sensitive data against theft and compromise.
Sommer
8 days agoFrance
10 days agoTrinidad
23 days agoParis
1 months agoBenedict
1 months agoCarlota
2 months agoMelissia
2 months agoBernadine
2 months agoArdella
3 months agoRicki
3 months agoTresa
3 months agoNorah
3 months agoRegenia
4 months agoGary
4 months agoClorinda
4 months agoViva
4 months agoSerina
5 months agoTresa
5 months agoHubert
5 months agoGlynda
5 months agoMaryann
5 months agoFabiola
6 months agoShalon
6 months agoKathrine
6 months agoCorinne
6 months agoLeonie
6 months agoHyun
7 months agoRamonita
7 months agoLai
7 months agoGlenna
7 months agoRolf
7 months agoTwanna
8 months agoLelia
8 months agoKeva
8 months agoErasmo
8 months agoAmie
9 months agoMike
10 months agoJody
10 months agoOdelia
10 months ago