ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 235 - CAS-004 discussion

Report
Export

A municipal department receives telemetry data from a third-party provider The server collecting telemetry sits in the municipal departments screened network and accepts connections from the third party over HTTPS. The daemon has a code execution vulnerability from a lack of input sanitization of out-of-bound messages, and therefore, the cybersecurity engineers would like to Implement nsk mitigations. Which of the following actions, if combined, would BEST prevent exploitation of this vulnerability? (Select TWO).

A.
Implementing a TLS inspection proxy on-path to enable monitoring and policy enforcement
Answers
A.
Implementing a TLS inspection proxy on-path to enable monitoring and policy enforcement
B.
Creating a Linux namespace on the telemetry server and adding to it the servicing HTTP daemon
Answers
B.
Creating a Linux namespace on the telemetry server and adding to it the servicing HTTP daemon
C.
Installing and configuring filesystem integrity monitoring service on the telemetry server
Answers
C.
Installing and configuring filesystem integrity monitoring service on the telemetry server
D.
Implementing an EDR and alert on Identified privilege escalation attempts to the SIEM
Answers
D.
Implementing an EDR and alert on Identified privilege escalation attempts to the SIEM
E.
Subscribing to a UTM service that enforces privacy controls between the internal network and the screened subnet
Answers
E.
Subscribing to a UTM service that enforces privacy controls between the internal network and the screened subnet
F.
Using the published data schema to monitor and block off nominal telemetry messages
Answers
F.
Using the published data schema to monitor and block off nominal telemetry messages
Suggested answer: A, C

Explanation:

A TLS inspection proxy can be used to monitor and enforce policy on HTTPS connections, ensuring that only valid traffic is allowed through and malicious traffic is blocked. Additionally, a filesystem integrity monitoring service can be installed and configured on the telemetry server to monitor for any changes to the filesystem, allowing any malicious changes to be detected and blocked.

asked 02/10/2024
Barret Tan
25 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first