exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 346 discussion

Actual exam question from CompTIA's CAS-004
Question #: 346
Topic #: 1
[All CAS-004 Questions]

A security analyst at a global financial firm was reviewing the design of a cloud-based system to identify opportunities to improve the security of the architecture. The system was recently involved in a data breach after a vulnerability was exploited within a virtual machine's operating system. The analyst observed the VPC in which the system was located was not peered with the security VPC that contained the centralized vulnerability scanner due to the cloud provider's limitations. Which of the following is the BEST course of action to help prevent this situation in the near future?

  • A. Establish cross-account trusts to connect all VPCs via API for secure configuration scanning.
  • B. Migrate the system to another larger, top-tier cloud provider and leverage the additional VPC peering flexibility.
  • C. Implement a centralized network gateway to bridge network traffic between all VPCs.
  • D. Enable VPC traffic mirroring for all VPCs and aggregate the data for threat detection.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
weaponxcel
Highly Voted 1 year, 1 month ago
Selected Answer: C
C. Implement a centralized network gateway to bridge network traffic between all VPCs. The question ask for the BEST course of action to help PREVENT this situation in the near future. Between the two options A and C, option C ("Implement a centralized network gateway") provides a network-level solution that directly enables inter-VPC communication, allowing the centralized vulnerability scanner to scan systems in the other VPC. This would likely provide a more comprehensive scanning capability than just configuration scanning via API.
upvoted 8 times
...
Ariel235788
Highly Voted 1 year, 2 months ago
Selected Answer: C
C. Implement a centralized network gateway to bridge network traffic between all VPCs. Explanation: Centralized Network Gateway: By implementing a centralized network gateway or hub (sometimes referred to as a "transit VPC"), you create a central point where traffic from multiple VPCs can be routed and monitored. This allows you to control and inspect traffic flowing between VPCs. Secure Traffic Routing: The centralized network gateway provides a secure way to route traffic between VPCs, even if direct VPC peering is not supported or limited by the cloud provider. It acts as an intermediary, ensuring that traffic flows through a controlled path. Security and Visibility: With traffic passing through the centralized gateway, you can implement security controls and monitoring, including vulnerability scanning, intrusion detection, and threat detection, to identify and respond to threats across the VPCs. Scalability: This approach is scalable and allows you to add additional VPCs in the future while maintaining centralized control and security.
upvoted 5 times
...
Bright07
Most Recent 1 day, 1 hour ago
Selected Answer: C
The BEST course of action to help prevent this situation in the near future is C. Implement a centralized network gateway to bridge network traffic between all VPCs. Centralized network gateway: This solution allows for secure communication and data exchange between different VPCs that cannot be directly peered due to cloud provider limitations. By implementing a centralized network gateway, the security VPC can still communicate with other VPCs, including the one that was involved in the breach, allowing the centralized vulnerability scanner to properly scan all systems for vulnerabilities. This solution is effective because it solves the issue of communication between VPCs that cannot be directly peered, enabling security scanning of the virtual machines across different VPCs.
upvoted 1 times
...
23169fd
4 months, 4 weeks ago
Selected Answer: A
Cross-account trusts allow different accounts and their respective VPCs to interact securely through APIs. This solution bypasses the VPC peering limitations by using API connections, which can be securely authenticated and authorized through cross-account roles and policies. It enables centralized vulnerability scanning and configuration management without needing direct network connectivity, enhancing security and ensuring continuous monitoring and complianc
upvoted 2 times
...
e4af987
8 months, 1 week ago
Selected Answer: A
Gemini's argument: In the scenario with the limitations on VPC peering with the security VPC, A. Establish cross-account trusts to connect all VPCs via API for secure configuration scanning is the least bad option out of the provided choices.
upvoted 1 times
...
e020fdc
9 months, 4 weeks ago
The cause of the issue was that the VPC was not peered with the scanner and so did not have the proper configurations. B is a bogus answer. C and D address issues with monitoring traffic to detect issues after they occurred. But we should have proper configuration in the first place. Sticking with A
upvoted 3 times
...
Trap_D0_r
11 months, 1 week ago
Selected Answer: A
A will allow you to immediately assess your security posture of all hosts and patch. Why not D? Traffic mirroring won't help prevent any more exfiltration or assess your security posture, it'll just give you more logs to sift through. Why not C? You're adding complexity to the system and possibly creating more vulnerability points (The word BRIDGE should scare you off right away). Also, rearranging the network won't be a fast or easy solution. Why not B? Because it's preposterous.
upvoted 1 times
...
Anarckii
11 months, 1 week ago
Selected Answer: D
If we bridge the network and centralize it, we create a single point of failure. This wouldn’t make sense since we are trying to address a centralized vulnerability. Answer is D
upvoted 2 times
...
OdinAtlasSteel
1 year ago
Selected Answer: D
While establishing cross-account trusts (option A) or implementing a centralized network gateway (option C) might help in certain scenarios, enabling VPC traffic mirroring offers a more targeted and efficient solution for monitoring network traffic and detecting vulnerabilities or threats across multiple VPCs in this context. Therefore, enabling VPC traffic mirroring for all VPCs and aggregating the data for threat detection (option D) is the most effective approach to help prevent similar vulnerabilities or breaches in the near future within the cloud-based system.
upvoted 1 times
...
wizwiz
1 year ago
Selected Answer: D
Answer is D: Reference: https://docs.aws.amazon.com/vpc/latest/mirroring/what-is-traffic-mirroring.html
upvoted 2 times
...
32d799a
1 year, 1 month ago
Selected Answer: A
Option A seems to be the most direct solution to the problem, enabling centralized vulnerability scanning without a need for physical or virtual network changes.
upvoted 1 times
...
CXSSP
1 year, 3 months ago
Selected Answer: A
A. Establish cross-account trusts to connect all VPCs via API for secure configuration scanning. This option focuses on setting up cross-account trusts, which would allow secure communication between VPCs for the purpose of configuration scanning. By doing this, the centralized vulnerability scanner in the security VPC can communicate with the VPC containing the system to perform secure scanning for vulnerabilities. This would help in preventing future breaches caused by unpatched vulnerabilities.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago