ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 295 - CAS-004 discussion

Report
Export

A security consultant is designing an infrastructure security solution for a client company that has provided the following requirements:

* Access to critical web services at the edge must be redundant and highly available.

* Secure access services must be resilient to a proprietary zero-day vulnerability in a single component.

* Automated transition of secure access solutions must be able to be triggered by defined events or manually by security operations staff.

Which of the following solutions BEST meets these requirements?

A.
Implementation of multiple IPSec VPN solutions with diverse endpoint configurations enabling user optionality in the selection of a remote access provider
Answers
A.
Implementation of multiple IPSec VPN solutions with diverse endpoint configurations enabling user optionality in the selection of a remote access provider
B.
Remote access services deployed using vendor-diverse redundancy with event response driven by playbooks.
Answers
B.
Remote access services deployed using vendor-diverse redundancy with event response driven by playbooks.
C.
Two separate secure access solutions orchestrated by SOAR with components provided by the same vendor for compatibility.
Answers
C.
Two separate secure access solutions orchestrated by SOAR with components provided by the same vendor for compatibility.
D.
Reverse TLS proxy configuration using OpenVPN/OpenSSL with scripted failover functionality that connects critical web services out to endpoint computers.
Answers
D.
Reverse TLS proxy configuration using OpenVPN/OpenSSL with scripted failover functionality that connects critical web services out to endpoint computers.
Suggested answer: B

Explanation:

Remote access services deployed using vendor-diverse redundancy with event response driven by playbooks is the best solution to meet the requirements. Vendor-diverse redundancy means using different vendors or technologies to provide the same service or function, which can increase the availability and resilience of the service. For example, if one vendor's VPN solution fails due to a zero-day vulnerability, another vendor's VPN solution can take over without affecting the users. Event response driven by playbooks means using predefined workflows or scripts to automate the actions or decisions that need to be taken in response to certain events or triggers. For example, a playbook can define how to switch between different remote access solutions based on certain criteria or conditions, such as performance, availability, security, or manual input. Playbooks can also be integrated with SOAR platforms to leverage their capabilities for orchestration, automation, and response. Verified

Reference:

https://cyware.com/security-guides/security-orchestration-automation-and-response/what-is-vendor-agnostic-security-orchestration-automation-and-response-soar-40e4

https://www.paloaltonetworks.com/cyberpedia/what-is-a-security-playbook

asked 02/10/2024
Erik-Jan Brul
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first