Valid CAS-005 Dumps shared by ExamDiscuss.com for Helping Passing CAS-005 Exam! ExamDiscuss.com now offer the newest CAS-005 exam dumps, the ExamDiscuss.com CAS-005 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com CAS-005 dumps with Test Engine here:
After remote desktop capabilities were deployed in the environment, various vulnerabilities were noticed. * Exfiltration of intellectual property * Unencrypted files * Weak user passwords Which of the following is the best way to mitigate these vulnerabilities? (Select two).
Correct Answer: A,E
To mitigate the identified vulnerabilities, the following solutions are most appropriate: A: Implementing data loss prevention (DLP): DLP solutions help prevent the unauthorized transfer of data outside the organization. This directly addresses the exfiltration of intellectual property by monitoring, detecting, and blocking sensitive data transfers. E: Enabling modern authentication that supports Multi-Factor Authentication (MFA): This significantly enhances security by requiring additional verification methods beyond just passwords. It addresses the issue of weak user passwords by making it much harder for unauthorized users to gain access, even if they obtain the password. Other options, while useful in specific contexts, do not address all the vulnerabilities mentioned: B: Deploying file integrity monitoring helps detect changes to files but does not prevent data exfiltration or address weak passwords. C: Restricting access to critical file services improves security but is not comprehensive enough to mitigate all identified vulnerabilities. D: Deploying directory-based group policies can enforce security policies but might not directly prevent data exfiltration or ensure strong authentication. F: Implementing a version control system helps manage changes to files but is not a security measure for preventing the identified vulnerabilities. G: Implementing a CMDB platform (Configuration Management Database) helps manage IT assets but does not address the specific security issues mentioned. References: CompTIA Security+ Study Guide NIST SP 800-53 Rev. 5, "Security and Privacy Controls for Information Systems and Organizations" CIS Controls, "Control 13: Data Protection" and "Control 16: Account Monitoring and Control"