CAS-004 Exam QuestionsBrowse all questions from this exam

CAS-004 Exam - Question 466


The information security manager at a 24-hour manufacturing facility is reviewing a contract for potential risks to the organization. The contract pertains to the support of printers and multifunction devices during non-standard business hours. Which of the following will the security manager most likely identify as a risk?

Show Answer
Correct Answer: B

The lack of a Non-Disclosure Agreement (NDA) with the company that supports its printers and multifunction devices during non-standard business hours is most likely the primary risk identified. Since printers and multifunction devices often handle sensitive information, an NDA would help ensure that the service provider maintains confidentiality and security over that data, thus mitigating the risk of unauthorized access or accidental disclosure.

Discussion

3 comments
Sign in to comment
isaphiltrickOption: B
Jul 6, 2024

The security manager at the manufacturing facility would most likely identify the lack of a Non-Disclosure Agreement (NDA) with the company supporting its printers and multifunction devices during non-standard business hours as a risk. Printers and multifunction devices often store sensitive information, such as documents that are scanned, printed, or faxed. Without an NDA in place, there is a risk that the service provider could access or inadvertently expose this sensitive information. This could potentially lead to breaches of confidentiality and compromise the security of the organization's data.

EAlonsoOption: A
Jul 16, 2024

This is a common issue

23169fdOption: B
Jul 18, 2024

In a manufacturing facility, especially one that operates 24 hours, ensuring that all devices have a verified and secure chain of custody is paramount. This ensures that devices have not been tampered with before they are deployed, which is crucial for maintaining the integrity and security of the operational environment. Without a secure chain of custody, there's a risk that devices could be compromised before they even reach the facility, leading to potential security breaches once they are in use.