exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 252 discussion

Actual exam question from CompTIA's CAS-004
Question #: 252
Topic #: 1
[All CAS-004 Questions]

When a remote employee traveled overseas, the employee’s laptop and several mobile devices with proprietary tools were stolen. The security team requires technical controls be in place to ensure no electronic data is compromised or changed. Which of the following BEST meets this requirement?

  • A. Mobile device management with remote wipe capabilities
  • B. Passwordless smart card authorization with biometrics
  • C. Next-generation endpoint detection and response agent
  • D. Full disk encryption with centralized key management
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
deeden
10 hours, 52 minutes ago
Selected Answer: A
While full disk encryption protects data at rest, it assumes that encryption keys remain secure. If the device is stolen, an adversary may attempt to extract the keys or exploit vulnerabilities. Additionally, this does not allow for the removal of data if the devices are never recovered.
upvoted 1 times
...
Bright07
1 week, 2 days ago
Selected Answer: A
A. Mobile device management with remote wipe capabilities. Why this is the best option: Mobile device management (MDM) with remote wipe allows the security team to remotely erase all data on the employee’s devices, including the laptop and mobile devices, as soon as the theft is reported. This ensures that no sensitive or proprietary data can be accessed, modified, or leaked from the stolen devices. Remote wipe capabilities ensure that even if the devices are offline, the data will be deleted once they connect to the internet. NOT D. Full disk encryption with centralized key management: Full disk encryption (FDE) would make it much more difficult for attackers to access the data without the decryption key. However, encryption alone doesn't completely guarantee that data won't be compromised if the attacker has access to the devices long enough to perform brute-force attacks or other methods. Centralized key management is helpful, but it doesn't directly allow for the remote deletion of data on the device, which is what the situation requires.
upvoted 3 times
...
Bright07
3 months, 2 weeks ago
ANS is CAPITAL A. Please people read the question very well. The question is talking about the data not being compromised while away. A very simple answer to this question is MDM(Mobile Device Management) and remote wipe capabilities
upvoted 2 times
...
23169fd
4 months, 4 weeks ago
Selected Answer: D
Full Disk Encryption (FDE): FDE ensures that all data on the device is encrypted, making it inaccessible to unauthorized users even if the device is stolen. This means that the data remains confidential and cannot be compromised or altered without proper decryption keys. Centralized Key Management: Centralized key management allows the organization to control and manage encryption keys securely. It ensures that even if the device is stolen, the keys required to decrypt the data are not on the device and can be revoked or rotated as necessary. This further ensures the integrity and confidentiality of the data.
upvoted 1 times
...
Trap_D0_r
11 months, 1 week ago
Selected Answer: D
I thought A but I have been convinced that it's D. The "or changed" in "no data is compromised or changed" is doing a lot of work on this question.
upvoted 4 times
...
Anarckii
12 months ago
Selected Answer: D
A would be correct but the question and scenario mentions a laptop. So D is the next best choice
upvoted 1 times
...
ThatGuyOverThere
1 year, 1 month ago
Selected Answer: D
I would agree with D. If you don't have an encrypted disk then somebody could just remote the drive from the laptop, connect it to another system and read all the data. Drive encryption needs to be the first priority.
upvoted 1 times
...
last_resort
1 year, 8 months ago
Selected Answer: D
Going to go with D. The wording "ensure no electronic data is compromised or changed" seems to rule out remote wipe.
upvoted 3 times
...
Amin4799
1 year, 8 months ago
Selected Answer: D
D okay to me
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago