Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 44 Topic 5 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 44 Topic 5 Discussion

312-49v11 Exam Topic 5 Question 44 Discussion:
Question #: 44
Topic #: 5

During a forensic investigation into a cyberattack that compromised a company’s sensitive data, the investigator discovers that the organization uses a cloud-based solution for managing user access across various internal systems. This solution includes features such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), and detailed access controls, all handled by a third-party service provider. The investigator examines logs from the authentication system and compares them with system access patterns to trace the illegal actions during the breach. What type of cloud service deployment is being utilized by the organization?


A.

The organization uses Desktop-as-a-Service (DaaS) for access controls or authentication management.


B.

The organization uses Infrastructure-as-a-Service (IaaS) for managing user access on systems and the network.


C.

The organization uses Platform-as-a-Service (PaaS) to deploy and manage custom-built authentication and access control applications.


D.

The organization uses Identity-as-a-Service (IDaaS) for enforcing authorization rules.


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.