CompTIA SecurityX Certification Exam CAS-005 Question # 78 Topic 8 Discussion

CompTIA SecurityX Certification Exam CAS-005 Question # 78 Topic 8 Discussion

CAS-005 Exam Topic 8 Question 78 Discussion:
Question #: 78
Topic #: 8

After remote desktop capabilities were deployed in the environment, various vulnerabilities were noticed.

• Exfiltration of intellectual property

• Unencrypted files

• Weak user passwords

Which of the following is the best way to mitigate these vulnerabilities? (Select two).


A.

Implementing data loss prevention


B.

Deploying file integrity monitoring


C.

Restricting access to critical file services only


D.

Deployingdirectory-based group policies


E.

Enabling modem authentication that supports MFA


F.

Implementing a version control system


G.

Implementing a CMDB platform


Get Premium CAS-005 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.