exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 79 discussion

Actual exam question from CompTIA's CAS-004
Question #: 79
Topic #: 1
[All CAS-004 Questions]

All staff at a company have started working remotely due to a global pandemic. To transition to remote work, the company has migrated to SaaS collaboration tools. The human resources department wants to use these tools to process sensitive information but is concerned the data could be:
✑ Leaked to the media via printing of the documents
✑ Sent to a personal email address
Accessed and viewed by systems administrators

✑ Uploaded to a file storage site
Which of the following would mitigate the department's concerns?

  • A. Data loss detection, reverse proxy, EDR, and PGP
  • B. VDI, proxy, CASB, and DRM
  • C. Watermarking, forward proxy, DLP, and MFA
  • D. Proxy, secure VPN, endpoint encryption, and AV
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
AlexJacobson
Highly Voted 2 years, 9 months ago
Selected Answer: C
It is C - watermarking would help against leaking to 3rd-parties, and DLP would help with sending to unauthorized email addresses. Forward proxy would deal with uploading to file storage site.
upvoted 11 times
dangerelchulo
2 years, 7 months ago
MFA will be protected against sys admin because you need all keys to unlock it and some can be held by the user that needs access and is not based on account privilege.
upvoted 4 times
...
strong1
1 year, 6 months ago
Watermarking is a way to mark data in a way that clearly displays important features or information, such as a classification, appropriate use, or terms of a license. Watermarking does not directly control how data is used but rather as a way to clearly identify classification or use/licensing terms.
upvoted 3 times
...
...
Tuno
Highly Voted 2 years, 3 months ago
Selected Answer: C
Watermarking, Leaked to the media via printing of the documents forward proxy, Uploaded to a file storage site DLP, Sent to a personal email address MFA, Accessed and viewed by systems administrators
upvoted 9 times
...
chooksmagooks
Most Recent 2 days, 17 hours ago
Selected Answer: B
B offers more layers specifically targeting the risks. CASB handles the SaaS application layer, DRM handles the document layer, and VDI/Proxy add endpoint/network controls. Option C lacks the direct document control (DRM) and the specialized SaaS oversight (CASB).
upvoted 1 times
...
deeden
5 months ago
Selected Answer: B
- **VDI (Virtual Desktop Infrastructure):** Prevents sensitive data from being stored locally, mitigating risks like printing or uploading to unauthorized sites. - **Proxy:** Monitors and controls network traffic to ensure sensitive information is not sent to personal email or unauthorized destinations. - **CASB (Cloud Access Security Broker):** Provides granular control and visibility over SaaS collaboration tools, enforcing policies to prevent sensitive data leakage. - **DRM (Digital Rights Management):** Protects sensitive documents by restricting how they can be accessed, shared, or printed.
upvoted 2 times
deeden
5 months ago
An example of a **Digital Rights Management (DRM)** tool that the HR department can use to prevent system administrators from viewing sensitive information is **Microsoft Azure Information Protection (AIP)**. **How AIP Works:** 1. **Classification and Labeling**: HR can label sensitive documents with restrictions (e.g., "Confidential"). 2. **Access Control**: Assign permissions such as "view only," "edit," or "deny" to specific users or groups. System administrators can be excluded from access. 3. **Encryption**: The document is encrypted, ensuring only authorized users can decrypt and view it. 4. **Activity Monitoring**: Tracks who accessed the document and what actions were performed.
upvoted 1 times
...
...
IT_Master_Tech
6 months ago
B.
upvoted 2 times
...
Chiaretta
9 months, 1 week ago
Selected Answer: B
B is the best answer, VDI is the core of the question.
upvoted 2 times
...
23169fd
9 months, 1 week ago
Selected Answer: B
not sure why option C got the vote. Watermarking: does not prevent data leakage or control how documents are accessed or shared. It only helps trace the source after the leak has occurred. Forward proxy: Useful for managing web traffic but doesn't provide comprehensive control over document access and usage. DLP: Effective in monitoring and blocking data transfer but may not cover all aspects of document usage and access. MFA: Enhances security for user access but doesn't address document usage control or unauthorized printing.
upvoted 3 times
...
ninjachuleta
12 months ago
Selected Answer: B
B) VDI, proxy, CASB, and DRM
upvoted 2 times
...
e4af987
1 year ago
Selected Answer: C
I've been in this situation but we used B (kind of). However - the current standards...
upvoted 1 times
...
nelombg
1 year, 2 months ago
B is the Answer.
upvoted 3 times
...
Trap_D0_r
1 year, 2 months ago
B is the only answer that prevents users from printing the documents (can't print from a virtual desktop), which is the first requirement.
upvoted 4 times
...
BinaryGuardian42
1 year, 5 months ago
Option B. VDI, proxy, CASB, and DRM would be the best choice to mitigate the department’s concerns. Here’s why: VDI (Virtual Desktop Infrastructure): This allows for a secure and isolated environment where data can be processed. It prevents data leakage as the data does not reside on the user’s personal device. Proxy: This can control and monitor the network traffic. It can prevent sensitive data from being sent to personal email addresses or being uploaded to a file storage site. CASB (Cloud Access Security Broker): This tool can provide visibility into SaaS application usage, data protection in the cloud, and threat protection. It can prevent unauthorized access to sensitive data, including by systems administrators. DRM (Digital Rights Management): This can control what users can do with the data. For example, it can prevent users from printing documents or copying information.
upvoted 5 times
...
OdinAtlasSteel
1 year, 5 months ago
Selected Answer: C
Watermarking: Watermarking involves embedding information into documents that uniquely identifies the user or system accessing the data. This helps trace the origin of leaked information if it's printed or shared improperly. Forward Proxy: A forward proxy can be used to control and monitor outbound traffic from the company's network, helping prevent unauthorized access to personal email addresses or file storage sites and enhancing security. DLP (Data Loss Prevention): DLP solutions help in identifying and preventing sensitive data from being inappropriately accessed, shared, or transmitted. It would aid in preventing unauthorized uploads to file storage sites or sending sensitive information to personal email addresses. MFA (Multi-Factor Authentication): Implementing MFA adds an additional layer of security, requiring multiple methods of authentication for access to sensitive data or systems. It helps prevent unauthorized access, even by systems administrators.
upvoted 2 times
...
bobsmith69
1 year, 6 months ago
Selected Answer: B
B surely, dont be tricked by DLP and Watermarking would do nothing
upvoted 2 times
...
32d799a
1 year, 6 months ago
Selected Answer: B
The letter B is the most comprehensive answer for yhe concerns listed.
upvoted 2 times
...
CoolCat22
1 year, 7 months ago
Selected Answer: B
one word CLOUD
upvoted 2 times
...
Uncle_Lucifer
1 year, 7 months ago
Selected Answer: B
I will pick DRM over Watermarking. Lets assume the data loss has occured, what will watermaking do to stop the access and use of the data? Absolutely nothing! DRM on the other hand requires a pin/access to use or access the data. B is better answer!
upvoted 2 times
Uncle_Lucifer
1 year, 7 months ago
After carefully reading the question, it is C. leak from printing documents is certainly protected by watermarking
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago