ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 116 - CAS-004 discussion

Report
Export

A company is outsourcing to an MSSP that performs managed detection and response services. The MSSP requires a server to be placed inside the network as a log aggregate and allows remote access to MSSP analyst. Critical devices send logs to the log aggregator, where data is stored for 12 months locally before being archived to a multitenant cloud. The data is then sent from the log aggregate to a public IP address in the MSSP datacenter for analysis.

A security engineer is concerned about the security of the solution and notes the following.

* The critical devise send cleartext logs to the aggregator.

* The log aggregator utilize full disk encryption.

* The log aggregator sends to the analysis server via port 80.

* MSSP analysis utilize an SSL VPN with MFA to access the log aggregator remotely.

* The data is compressed and encrypted prior to being achieved in the cloud.

Which of the following should be the engineer's GREATEST concern?

A.
Hardware vulnerabilities introduced by the log aggregate server
Answers
A.
Hardware vulnerabilities introduced by the log aggregate server
B.
Network bridging from a remote access VPN
Answers
B.
Network bridging from a remote access VPN
C.
Encryption of data in transit
Answers
C.
Encryption of data in transit
D.
Multinancy and data remnants in the cloud
Answers
D.
Multinancy and data remnants in the cloud
Suggested answer: C

Explanation:

Encryption of data in transit should be the engineer's greatest concern regarding the security of the solution. Data in transit refers to data that is being transferred over a network or between devices. If data in transit is not encrypted, it can be intercepted, modified, or stolen by attackers who can exploit vulnerabilities in the network protocols or devices. The solution in the question sends logs from the critical devices to the aggregator in cleartext and from the aggregator to the analysis server via port 80, which are both insecure methods that expose the data to potential attacks. Verified

Reference: https://www.comptia.org/training/books/casp-cas-004-study-guide , https://us-cert.cisa.gov/ncas/tips/ST04-019

asked 02/10/2024
Cornelia Bauer
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first