exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 228 discussion

Actual exam question from CompTIA's CAS-004
Question #: 228
Topic #: 1
[All CAS-004 Questions]

A city government's IT director was notified by the city council that the following cybersecurity requirements must be met to be awarded a large federal grant:

• Logs for all critical devices must be retained for 365 days to enable monitoring and threat hunting.
• All privileged user access must be tightly controlled and tracked to mitigate compromised accounts.
• Ransomware threats and zero-day vulnerabilities must be quickly identified.

Which of the following technologies would BEST satisfy these requirements? (Choose three.)

  • A. Endpoint protection
  • B. Log aggregator
  • C. Zero trust network access
  • D. PAM
  • E. Cloud sandbox
  • F. SIEM
  • G. NGFW
Show Suggested Answer Hide Answer
Suggested Answer: ADF 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Broesweelies
Highly Voted 1 year, 9 months ago
Selected Answer: BDF
BDF, 100% sure
upvoted 6 times
nuel_12
1 year ago
a SIEM contain log aggregator the is no need of a log aggregator again the best choice of answer is ADF
upvoted 5 times
...
...
deeden
Most Recent 2 days, 3 hours ago
Selected Answer: ADF
The best choices to meet the grant requirements would indeed be: A. Endpoint Protection (for ransomware/zero-day detection and endpoint defense). D. PAM (for privileged user access control and tracking). F. SIEM (for log retention, monitoring, and threat hunting).
upvoted 1 times
...
ServerBrain
4 months, 2 weeks ago
Selected Answer: ADF
ADF. How do you address "Ransomware threats and zero-day vulnerabilities must be quickly identified." with answer BDF.
upvoted 3 times
...
23169fd
4 months, 3 weeks ago
Selected Answer: BDF
B. Log aggregator: A log aggregator collects and stores logs from various devices and systems, ensuring that logs for all critical devices are retained for 365 days. This is essential for monitoring and threat hunting as it provides a centralized repository for log data. D. PAM (Privileged Access Management): PAM solutions help control and track privileged user access. They enforce strict access controls, monitor privileged sessions, and provide detailed audit logs, mitigating the risk of compromised accounts. F. SIEM (Security Information and Event Management): SIEM systems collect and analyze log data from across the organization in real-time, providing insights into potential security threats, including ransomware and zero-day vulnerabilities. SIEM solutions often include capabilities for threat detection, incident response, and compliance reporting.
upvoted 1 times
...
ninjachuleta
6 months, 1 week ago
Selected Answer: ADF
A Endpoint Protection D Security Information and Event Management F Privileged Access Management
upvoted 4 times
ninjachuleta
6 months, 1 week ago
SIEM is a log aggregator therefore B is redundant.
upvoted 1 times
SangSang
6 months ago
No, SIEM is include log aggregator, not is a log aggregator
upvoted 3 times
...
...
...
Blingy
10 months, 1 week ago
Going with ADF
upvoted 2 times
...
Trap_D0_r
11 months, 1 week ago
Selected Answer: ADF
As others here have pointed out, but I will say again loudly: A SIEM IS A LOG AGGREGATOR ON STEROIDS. If you have a nice modern SIEM, you don't need a janky old log bucket server. The answer is ADF.
upvoted 4 times
...
Anarckii
11 months, 1 week ago
Selected Answer: ADE
Endpoint Protection for zero-day PAM for access control and SIEM for logs and event managing
upvoted 4 times
...
OdinAtlasSteel
1 year ago
Selected Answer: ADF
SIEM (Security Information and Event Management): Despite being a log aggregator, a SIEM solution is crucial for its broader functionalities, including log management, threat detection, and compliance reporting. Endpoint Protection (Endpoint Security Solution): Endpoint Protection solutions are indeed vital for identifying ransomware threats, zero-day vulnerabilities, and other endpoint-related security risks. They provide security features specifically designed to protect individual devices and endpoints. Privileged Access Management (PAM): PAM solutions play a crucial role in tightly controlling and tracking privileged user access, mitigating the risks associated with compromised accounts, aligning with the specified requirement.
upvoted 3 times
...
nuel_12
1 year ago
Selected Answer: ADF
A. for zero day vulnerability D. for privilege access management F. for log collection and aggregation
upvoted 2 times
...
ThatGuyOverThere
1 year, 1 month ago
Selected Answer: ADF
While you often use a log aggregator to send logs to a SIEM, I think leaving endpoint protection out to choose log aggregator is a mistake. It will be crucial for identifying and stopping vulnerabilities and threats on the endpoint.
upvoted 2 times
...
32d799a
1 year, 1 month ago
Selected Answer: DEF
F) --> Logs for all critical devices must be retained for 365 days to enable monitoring and threat hunting. D) --> All privileged user access must be tightly controlled and tracked to mitigate compromised accounts. E) --> Ransomware threats and zero-day vulnerabilities must be quickly identified.
upvoted 2 times
...
Ariel235788
1 year, 2 months ago
Selected Answer: BDF
To satisfy the specified cybersecurity requirements for a city government seeking a federal grant, the following technologies would be the best choices: B. Log aggregator: A log aggregator (also known as a Security Information and Event Management or SIEM system) can collect, store, and analyze logs from critical devices. It enables log retention for 365 days, aiding in monitoring, threat detection, and investigation. D. PAM (Privileged Access Management): PAM solutions can tightly control and track privileged user access. They help in mitigating the risks associated with compromised accounts by providing strict access controls, session monitoring, and auditing. F. SIEM (Security Information and Event Management): A SIEM system is essential for quickly identifying ransomware threats, zero-day vulnerabilities, and other security incidents. It correlates and analyzes data from various sources, including logs from critical devices, to detect anomalies and threats. While the other technologies mentioned can be valuable in certain contexts, they may not directly address all the specified requirements
upvoted 1 times
...
BiteSize
1 year, 4 months ago
Selected Answer: ADF
A. Endpoint protection - through either EPP or EDR prevents ransomware and zero days through various plugins at the endpoint D. Privileged Access Management - Implements and enforces least privilege (iCAM) F. Security Information and Event Management - Includes heavy forwards, universal forwarders, search heads, and indexers to provide logs in a single pane of glass (pretty much a log aggregator but better) B and F seem like the same answer but don't offer the BEST solution. What kind of organization doesn't use Endpoint protection to protect from ransomware or zero-days? -Surprised nobody has thought of this yet Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 4 times
...
itsTopaz
1 year, 8 months ago
Selected Answer: BDF
B. Log aggregator - This technology collects and centralizes logs from various devices, allowing for easy monitoring and analysis of network activity. Retaining logs for 365 days would help the city government in monitoring and threat hunting. D. PAM (Privileged Access Management) - It controls and monitors privileged user access, reducing the risk of compromised accounts. PAM also maintains a record of privileged access activity, providing an audit trail for accountability. F. SIEM (Security Information and Event Management) - SIEM technology is designed to quickly identify threats, including ransomware and zero-day vulnerabilities, by correlating data from various sources and alerting security personnel in real-time. This helps in quick identification and resolution of cybersecurity issues.
upvoted 3 times
...
smqzbq
1 year, 9 months ago
Selected Answer: BDF
B D F seems reasonable.
upvoted 3 times
...
Cock
1 year, 9 months ago
Selected Answer: BDF
The three technologies that would BEST satisfy these requirements are: B. Log aggregator - to retain logs for 365 days to enable monitoring and threat hunting. D. PAM - to tightly control and track privileged user access to mitigate compromised accounts. F. SIEM - to quickly identify ransomware threats and zero-day vulnerabilities.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago