exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 47 discussion

Actual exam question from CompTIA's CAS-004
Question #: 47
Topic #: 1
[All CAS-004 Questions]

A security engineer needs to recommend a solution that will meet the following requirements:
✑ Identify sensitive data in the provider's network
✑ Maintain compliance with company and regulatory guidelines
✑ Detect and respond to insider threats, privileged user threats, and compromised accounts
✑ Enforce datacentric security, such as encryption, tokenization, and access control
Which of the following solutions should the security engineer recommend to address these requirements?

  • A. WAF
  • B. CASB
  • C. SWG
  • D. DLP
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Mr_BuCk3th34D
Highly Voted 2 years, 3 months ago
A WAF (web application firewall) is a security tool that is designed to protect web applications from attacks by monitoring and filtering incoming traffic, but it is not typically used to identify and protect sensitive data within an organization's network. A CASB (cloud access security broker) is a security tool that is designed to protect data in the cloud by monitoring and controlling access to cloud services, but it is not typically used to identify and protect sensitive data within an organization's network. A SWG (secure web gateway) is a security tool that is designed to protect an organization's network from internet-based threats by analyzing and filtering incoming traffic, but it is not typically used to identify and protect sensitive data within an organization's network. Overall, a DLP solution would be the best option for meeting the requirements listed above. It can be used to identify sensitive data in the provider's network, maintain compliance with company and regulatory guidelines, detect and respond to insider threats, privileged user threats, and compromised accounts, and enforce datacentric security measures such as encryption, tokenization, and access control. Answer is D.
upvoted 20 times
...
DaleC78
Highly Voted 2 years, 3 months ago
Selected Answer: B
The listed requirements match the features that a CASB provides. There's no indication that this recommendation is for an on-prem environment. Read carefully: "Identify sensitive data in the provider's network". Keyword "provider".
upvoted 12 times
tornasol
1 year, 8 months ago
Provider that can have the data in a on-prem enviroment, no?
upvoted 2 times
...
...
Bright07
Most Recent 2 weeks, 6 days ago
Selected Answer: D
Identify sensitive data: DLP solutions are designed specifically to discover and classify sensitive data across the network, on endpoints, and in storage systems. Maintain compliance: DLP solutions help ensure that sensitive data is handled in compliance with regulatory requirements (such as GDPR, HIPAA, PCI-DSS). Detect and respond to insider threats, privileged user threats, and compromised accounts: DLP systems can monitor and alert on suspicious actions related to sensitive data. For example, they can detect if a privileged user is accessing or transferring sensitive data without authorization, which is critical for detecting insider threats or compromised accounts. Enforce datacentric security: DLP can enforce datacentric security measures like encryption, tokenization, and access control. It can prevent the unintentional or malicious sharing of sensitive data by enforcing rules such as encryption when data is being sent externally or preventing it from being transferred to unauthorized locations.
upvoted 1 times
...
IT_Master_Tech
6 months ago
b
upvoted 1 times
...
grelaman
6 months ago
Selected Answer: B
The term "provider's network" suggests that the data resides within a network owned or managed by a third-party service provider rather than the organization's own on-premises network. The mention of a "provider" typically points to cloud service providers (CSPs) like AWS, Azure, Google Cloud, or SaaS applications. the combination of needing to identify sensitive data in a provider's network, enforce data-centric security, and monitor for insider threats strongly aligns with challenges faced in cloud environments. Said that, To address all the specified requirements comprehensively, the security engineer should recommend implementing a Cloud Access Security Broker (CASB) solution.
upvoted 1 times
...
23169fd
9 months, 1 week ago
Selected Answer: D
Comprehensive Data Discovery: DLP solutions are well-suited to identify and classify sensitive data across the provider’s network, covering both on-premises and cloud environments if needed. Compliance Enforcement: DLP helps maintain compliance with regulatory guidelines by monitoring and controlling data flows and ensuring sensitive data is handled appropriately. Threat Detection: DLP can effectively detect and respond to insider threats, privileged user threats, and compromised accounts by monitoring data movements and enforcing security policies. Data-Centric Security: DLP enforces data-centric security measures such as encryption, tokenization, and access control, ensuring sensitive data is protected.
upvoted 1 times
...
tester27
10 months, 1 week ago
Chatgpt's first answer is DLP, but changed to CASB after giving this link: https://www.microsoft.com/en-us/security/business/security-101/what-is-a-cloud-access-security-broker-casb HAHA
upvoted 3 times
...
ElDirec
1 year, 2 months ago
Selected Answer: D
A DLP solution can help identify sensitive data in the network, maintain compliance with guidelines, detect and respond to various threats, and enforce data-centric security measures. It can monitor and control endpoint activities, filter data streams on corporate networks, and monitor data in the cloud to protect data at rest, in motion, and in use.
upvoted 1 times
...
abrub
1 year, 3 months ago
Selected Answer: D
DLP - doesn't state anything about cloud-based and Secure Web Gateway is out of the question.
upvoted 3 times
...
Anarckii
1 year, 3 months ago
Selected Answer: D
no where In the question does it mention cloud, so it has to be DLP
upvoted 3 times
...
happyf33t
1 year, 5 months ago
Selected Answer: D
WAF - Web application CASB - Cloud services activities SWG - doesn't meet the criteria DLP - fits the requirements
upvoted 5 times
...
Brianny93
1 year, 6 months ago
Selected Answer: D
CASBs provide you with visibility into how clients and other network nodes are using cloud services. Some of the functions of a CASB are: Enable single sign-on authentication and enforce access controls and authorizations from the enterprise network to the cloud provider. Scan for malware and rogue or non-compliant device access. Monitor and audit user and resource activity. Mitigate data exfiltration by preventing access to unauthorized cloud services from managed devices.
upvoted 2 times
...
CoinUmbrella
1 year, 7 months ago
Selected Answer: D
Identify sensitive data: DLP solutions are designed to identify sensitive data within a network. They can scan and classify data to ensure that sensitive information is appropriately protected. Maintain compliance: DLP solutions often come with built-in compliance templates and policies that can help organizations maintain compliance with both company-specific policies and regulatory guidelines. They can also provide audit trails and reporting to demonstrate compliance. Detect and respond to insider threats, privileged user threats, and compromised accounts: DLP solutions can monitor user activity and data transfers, helping to detect and respond to insider threats. They can also identify when privileged users access sensitive data inappropriately and can trigger alerts or block access. Additionally, DLP can detect unusual data access patterns associated with compromised accounts. Enforce data-centric security: DLP solutions enforce data-centric security measures such as encryption, tokenization, and access control. They can prevent unauthorized access to sensitive data and ensure that data is protected regardless of where it resides.
upvoted 4 times
...
Sleezyglizzy
1 year, 8 months ago
B even looking up the features it is asking yes certain sites are pointing to CASB, but even Wikipedia saying cloud provider.
upvoted 2 times
...
BiteSize
1 year, 9 months ago
Selected Answer: D
Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 5 times
...
kyle942
1 year, 9 months ago
It is B, hits all the requirements: https://www.microsoft.com/en-us/security/business/security-101/what-is-a-cloud-access-security-broker-casb
upvoted 2 times
...
CASP_Master
1 year, 11 months ago
D. DLP (Data Loss Prevention) would be the best solution to address these requirements. DLP solutions can identify sensitive data, classify and tag it, and enforce data-centric security policies, such as encryption and access control. It can also detect and respond to insider threats, privileged user threats, and compromised accounts, and maintain compliance with regulatory guidelines by monitoring data at rest, in use, and in transit. WAF (Web Application Firewall) and SWG (Secure Web Gateway) can protect web applications and network traffic, respectively, but they do not provide the same level of data-centric security and compliance as DLP. CASB (Cloud Access Security Broker) can enforce policies for cloud applications and services, but it may not cover all sensitive data in the provider's network.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago