ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 320 - CAS-004 discussion

Report
Export

A consultant needs access to a customer's cloud environment. The customer wants to enforce the following engagement requirements:

* All customer data must remain under the control of the customer at all times.

* Third-party access to the customer environment must be controlled by the customer.

* Authentication credentials and access control must be under the customer's control.

Which of the following should the consultant do to ensure all customer requirements are satisfied when accessing the cloud environment?

A.
use the customer's SSO with read-only credentials and share data using the customer's provisioned secure network storage
Answers
A.
use the customer's SSO with read-only credentials and share data using the customer's provisioned secure network storage
B.
use the customer-provided VDI solution to perform work on the customer's environment.
Answers
B.
use the customer-provided VDI solution to perform work on the customer's environment.
C.
Provide code snippets to the customer and have the customer run code and securely deliver its output
Answers
C.
Provide code snippets to the customer and have the customer run code and securely deliver its output
D.
Request API credentials from the customer and only use API calls to access the customer's environment.
Answers
D.
Request API credentials from the customer and only use API calls to access the customer's environment.
Suggested answer: B

Explanation:

The consultant should use the customer-provided VDI solution to perform work on the customer's environment. VDI stands for virtual desktop infrastructure, which is a technology that allows users to access a virtual desktop hosted on a remote server. VDI can help meet the customer's requirements by ensuring that all customer data remains under the customer's control at all times, that third-party access to the customer environment is controlled by the customer, and that authentication credentials and access control are under the customer's control. Verified

Reference:

https://www.kaspersky.com/resource-center/threats/how-to-avoid-social-engineering-attacks

https://www.eccouncil.org/cybersecurity-exchange/ethical-hacking/understanding-preventing-social-engineering-attacks/

https://www.indusface.com/blog/10-ways-businesses-can-prevent-social-engineering-attacks/

asked 02/10/2024
nagalingam mk
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first