Valid CAS-005 Dumps shared by ExamDiscuss.com for Helping Passing CAS-005 Exam! ExamDiscuss.com now offer the newest CAS-005 exam dumps, the ExamDiscuss.com CAS-005 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com CAS-005 dumps with Test Engine here:
During a recent security event, access from the non-production environment to the production environment enabled unauthorized users to: * Install unapproved software * Make unplanned configuration changes During the investigation, the following findings were identified: * Several new users were added in bulk by the IAM team * Additional firewalls and routers were recently added * Vulnerability assessments have been disabled for more than 30 days * The application allow list has not been modified in two weeks * Logs were unavailable for various types of traffic * Endpoints have not been patched in over ten days Which of the following actions would most likely need to be taken to ensure proper monitoring? (Select two)
Correct Answer: A,D,E
Comprehensive and Detailed Explanation: * Understanding the Security Event: * Unauthorized users gained access from non-production to production. * IAM policies were weak, allowing bulk user creation. * Vulnerability assessments were disabled, and patching was delayed. * Logs were unavailable, making incident response difficult. * Why Options A, D, and E are Correct: * A (Disable bulk user creation by IAM team) # Prevents unauthorized mass user account creation, which could be exploited by attackers. * D (Routine updates for endpoints & network devices) # Patch management ensures vulnerabilities are not left open for attackers. * E (Ensure all security/network devices send logs to SIEM) # Helps with real-time monitoring and detection of unauthorized activities. * Why Other Options Are Incorrect: * B (180-day log retention) # While log retention is good, real-time monitoring is the priority. * C (Review application allow list daily) # Reviewing it daily is impractical. Regular audits are better. * F (Restrict production-to-non-production traffic) # The issue is unauthorized access, not traffic routing.