exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 425 discussion

Actual exam question from CompTIA's CAS-004
Question #: 425
Topic #: 1
[All CAS-004 Questions]

A security architect is tasked with securing a new cloud-based videoconferencing and collaboration platform to support a new distributed workforce. The security architect's key objectives are to:

• Maintain customer trust
• Minimize data leakage
• Ensure non-repudiation

Which of the following would be the best set of recommendations from the security architect?

  • A. Enable the user authentication requirement, enable end-to-end encryption, and enable waiting rooms.
  • B. Disable file exchange, enable watermarking, and enable the user authentication requirement.
  • C. Enable end-to-end encryption, disable video recording, and disable file exchange.
  • D. Enable watermarking, enable the user authentication requirement, and disable video recording.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bright07
4 weeks ago
Selected Answer: B
Enable the user authentication requirement: Objective: Ensures non-repudiation by ensuring that all users are properly authenticated before accessing the platform. This step helps guarantee that users are who they claim to be, and actions can be traced back to specific individuals, which is crucial for accountability and trust. Enable watermarking: Objective: Minimizes data leakage and ensures that if sensitive content is shared or leaked, it can be traced back to the individual or session responsible and makes it more difficult for attackers or malicious insiders to share content without being identified, and this helps reduce the risk of data leakage. Disable file exchange: Objective: Minimizes data leakage by preventing the sharing of files that could contain sensitive or confidential information most especially in a cloud environment, it can introduce risks if users are sharing unapproved or unencrypted files.
upvoted 1 times
...
041ba31
1 month, 2 weeks ago
The best answer is A. Enable the user authentication requirement, enable end-to-end encryption, and enable waiting rooms. This set of recommendations addresses maintaining customer trust through user authentication, minimizes data leakage with end-to-end encryption, and ensures non-repudiation by requiring user authentication and potentially controlling access with waiting rooms.
upvoted 3 times
...
cf13076
2 months, 3 weeks ago
Selected Answer: A
A. Enable the user authentication requirement, enable end-to-end encryption, and enable waiting rooms. Enabling the user authentication requirement ensures that only authorized users can access the videoconferencing platform, which helps maintain customer trust. Enabling end-to-end encryption secures the data exchanged during videoconferencing sessions, minimizing data leakage. Enabling waiting rooms allows the host to control who enters the meeting, adding an extra layer of security and ensuring non-repudiation. This set of recommendations aligns with the security architect's key objectives of maintaining customer trust, minimizing data leakage, and ensuring non-repudiation.
upvoted 3 times
...
saucehozz
2 months, 3 weeks ago
Selected Answer: A
A meets the objectives
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago