exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 601 discussion

Actual exam question from CompTIA's CAS-004
Question #: 601
Topic #: 1
[All CAS-004 Questions]

A systems administrator is developing an implementation plan for mobile device use within the corporate environment. Currently, there are no controls in place limiting the ability to install corporate applications on personal devices. The systems administrator needs to ensure devices that access corporate data meet minimum security requirements and maintain segmentation between personal and corporate data. Which of the following functions would be best to implement to support the stated requirements? (Choose two.)

  • A. Containerization
  • B. Allow list
  • C. Block list
  • D. Token-based access,
  • E. Conditional access
  • F. Geofencing
  • G. Firmware over-the-air
Show Suggested Answer Hide Answer
Suggested Answer: AE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bright07
3 months ago
Selected Answer: AE
Containerization: Containerization involves separating corporate apps and data from personal apps and data on a mobile device. This allows the system administrator to ensure that corporate data is kept secure and is only accessible through a controlled environment, even if the device is personal. Essentially, corporate data and personal data don’t mix. For example, using a tool like Mobile Device Management (MDM) software, a container can be set up to keep work-related apps and data separate from personal apps, thus ensuring privacy and security. Conditional access: Conditional access helps enforce specific security policies based on the state of the device. For example, access to corporate applications or data can be restricted unless the device is compliant with certain security policies like having a password, being encrypted, or being free from malware. Conditional access policies are highly effective at ensuring only secure, compliant devices can access corporate resources, regardless of whether the device is personal or corporate-owned.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago