CompTIA SecurityX Certification Exam CAS-005 Question # 34 Topic 4 Discussion

CompTIA SecurityX Certification Exam CAS-005 Question # 34 Topic 4 Discussion

CAS-005 Exam Topic 4 Question 34 Discussion:
Question #: 34
Topic #: 4

During a recent security event, access from the non-production environment to the production environment enabled unauthorized users to install unapproved software and make unplanned configuration changes. During an investigation, the following findings are identified:

• Several new users were added in bulk by the IAM team.

• Additional firewalls and routers were recently added to the network.

• Vulnerability assessments have been disabled for all devices for more than 30 days.

• The application allow list has not been modified in more than two weeks.

• Logs were unavailable for various types of traffic.

• Endpoints have not been patched in more than ten days.

Which of the following actions would most likely need to be taken to ensure proper monitoring is in place within the organization? (Select two)


A.

Disable bulk user creations by the IAM team.


B.

Extend log retention for all security and network devices for 180 days for all traffic.


C.

Review the application allow list on a daily basis to make sure it is properly configured.


D.

Routinely update all endpoints and network devices as soon as new patches/hot fixes are available.


E.

Ensure all network and security devices are sending relevant data to the SIEM.


F.

Configure rules on all firewalls to only allow traffic from the production environment to the non-production environment.


Get Premium CAS-005 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.