List of questions
Related questions
Question 235 - CAS-004 discussion
A municipal department receives telemetry data from a third-party provider The server collecting telemetry sits in the municipal departments screened network and accepts connections from the third party over HTTPS. The daemon has a code execution vulnerability from a lack of input sanitization of out-of-bound messages, and therefore, the cybersecurity engineers would like to Implement nsk mitigations. Which of the following actions, if combined, would BEST prevent exploitation of this vulnerability? (Select TWO).
A.
Implementing a TLS inspection proxy on-path to enable monitoring and policy enforcement
B.
Creating a Linux namespace on the telemetry server and adding to it the servicing HTTP daemon
C.
Installing and configuring filesystem integrity monitoring service on the telemetry server
D.
Implementing an EDR and alert on Identified privilege escalation attempts to the SIEM
E.
Subscribing to a UTM service that enforces privacy controls between the internal network and the screened subnet
F.
Using the published data schema to monitor and block off nominal telemetry messages
Your answer:
0 comments
Sorted by
Leave a comment first