exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 553 discussion

Actual exam question from CompTIA's CAS-004
Question #: 553
Topic #: 1
[All CAS-004 Questions]

A company that provides services to clients who work with highly sensitive data would like to provide assurance that the data’s confidentiality is maintained in a dynamic, low-risk environment. Which of the following would best achieve this goal? (Choose two.)

  • A. Install a SOAR on all endpoints.
  • B. Hash all files.
  • C. Install SIEM within a SOC.
  • D. Encrypt all data and files at rest, in transit, and in use.
  • E. Configure SOAR to monitor and intercept files and data leaving the network.
  • F. Implement file integrity monitoring.
Show Suggested Answer Hide Answer
Suggested Answer: DF 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bright07
2 weeks, 3 days ago
Selected Answer: DF
D. Encrypt all data and files at rest, in transit, and in use. Encryption is the fundamental measure to ensure data confidentiality. By encrypting data both at rest (when stored on a disk), in transit (while being transferred over networks), and in use (when actively being processed or accessed), the company ensures that even if an unauthorized party gains access to the data, they will not be able to read or use it without the appropriate decryption keys. This is especially important for sensitive data, as it protects it across all stages of its lifecycle. F. Implement file integrity monitoring. File integrity monitoring (FIM) ensures that files are not tampered with, deleted, or altered in unauthorized ways. This helps maintain confidentiality by detecting any unauthorized changes to files containing sensitive data. If someone attempts to modify, replace, or exfiltrate sensitive data, FIM will alert the administrators, allowing them to respond quickly to protect data integrity and confidentiality.
upvoted 2 times
...
a18733c
1 month, 3 weeks ago
Selected Answer: DE
File Integrity Monitoring doesn't address the confidentiality requirement. An unauthorized user could view the file without changing it and FIM will not care or alert on it thus missing out on a confidentiality breach.
upvoted 2 times
881cfb8
1 month ago
Agree question asks confidentiality can ignore integrity so ignore fim
upvoted 1 times
...
...
c4521e0
2 months, 3 weeks ago
Selected Answer: DF
D. Encrypt all data and files at rest, in transit, and in use. Encryption ensures that sensitive data is protected at all stages (while stored, being transferred, and being used). This significantly mitigates the risk of unauthorized access or disclosure. F. Implement file integrity monitoring. File integrity monitoring ensures that any unauthorized changes to files are detected, adding an extra layer of protection to sensitive data and maintaining its confidentiality.
upvoted 3 times
...
grelaman
2 months, 4 weeks ago
Selected Answer: DE
D. Encrypting data at all stages ensures that sensitive information remains confidential, even if intercepted or accessed by unauthorized parties. By encrypting data at rest (stored data), in transit (data being transferred over networks), and in use (data being processed), the company significantly reduces the risk of data breaches and unauthorized access. E. Configure SOAR to monitor and intercept files and data leaving the network: SOAR platforms can be configured to monitor network traffic and intercept unauthorized data transfers. By doing so, the company can detect and prevent potential data exfiltration attempts, ensuring that sensitive data does not leave the network without proper authorization. WHy not F: FIM tracks changes to files to ensure they have not been altered maliciously, which addresses data integrity rather than confidentiality. While important for security, FIM does not prevent unauthorized access or disclosure of sensitive data.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago