exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 182 discussion

Actual exam question from CompTIA's CAS-004
Question #: 182
Topic #: 1
[All CAS-004 Questions]

A company wants to improve its active protection capabilities against unknown and zero-day malware. Which of the following is the MOST secure solution?

  • A. NIDS
  • B. Application allow list
  • C. Sandbox detonation
  • D. Endpoint log collection
  • E. HIDS
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
beanbag
Highly Voted 2 years, 7 months ago
Selected Answer: C
Sandbox security testing proactively detects malware by running suspicious code in a safe and isolated environment, and monitoring the behavior and outputs of the code. This is known as “detonation”. The major advantage of sandbox-based security testing is that it can reliably detect unknown threats
upvoted 11 times
yungshag
2 years, 3 months ago
I agree with Ckl22 and go with B. Key word is active.
upvoted 3 times
...
...
Ariel235788
Highly Voted 1 year, 6 months ago
Selected Answer: B
Crazy cause you know, if you have an application ALLOW list (app whitelist) that means unknown malware wouldnt even be allowed to run in your environment. hence zero days would be mostly covered. Basically with an app whitelist you're reducing your attack surface of zero days. Sandboxing only allows for testing of malware, not necessarily provide active protection capabilities
upvoted 8 times
...
Steel16
Most Recent 2 months ago
Selected Answer: C
The most secure solution against unknown and zero-day malware is a layered security approach that heavily utilizes advanced threat detection techniques powered by artificial intelligence (AI) and machine learning (ML), including sandboxing, behavioral analysis, and heuristic detection, combined with a robust firewall, regular software updates, and strict user access controls; this allows for proactive identification of suspicious activity even when the malware signature is completely unknown. Sandboxing is isolating suspicious files in a controlled environment to observe their behavior without risking the wider network, allowing for detailed analysis of potential zero-day exploits.
upvoted 1 times
...
deeden
4 months, 2 weeks ago
Selected Answer: D
I think sandboxing is more effective. Stuxnet relied on exploiting Windows and Siemens PLC software. Aurora exploited Internet Explorer, which would likely be whitelisted in most environments. EternalBlue targeted SMB protocol vulnerabilities in Windows. Since SMB services are part of the operating system, whitelisting wouldn’t block this exploit.
upvoted 1 times
...
ninjachuleta
11 months ago
Selected Answer: B
Active protection capabilities against unknown and zero-day malware. Sandbox detonation would be for known malware.
upvoted 1 times
...
jhxetc
1 year, 3 months ago
Selected Answer: C
B, by definition cannot solve the problem. Think about it - you can't know if an application you've whitelisted has "UNKNOWN" malware unless you've tested it somehow... I.e. Sandbox detonation. Correct answer is C.
upvoted 4 times
...
Anarckii
1 year, 4 months ago
Selected Answer: B
the goal is to protect again unknown and zero-day vulnerabilities. Since these are unknown, you would want to allow only known and trusted applications to run. B and C are correct, but due to the question B is the correct answer
upvoted 3 times
Anarckii
1 year, 4 months ago
Changing to C as the question ask for active protection capabilities
upvoted 1 times
...
...
32d799a
1 year, 6 months ago
Selected Answer: C
C. Sandbox detonation: This involves executing incoming files in a controlled environment (sandbox) to see if they display any malicious behaviors. If they do, they are flagged as malicious.
upvoted 2 times
...
Meep123
1 year, 6 months ago
Application attempts to get into environment Allow/Deny Sandbox security testing Stop it before it gains entry. Thoughts?
upvoted 1 times
...
Knarles
1 year, 8 months ago
I believe C is the answer because an application allow list is going to obviously prevent the use of applications on a system. Zero-day malware may be present in software that you or your organization need to use. Therefore denying the use of that application isn't the answer. Detonating within a sandbox to determine if there are any issues would proactively work against the problem.
upvoted 4 times
...
RoVasq3
1 year, 9 months ago
Selected Answer: B
I believe the answer is Application Allow list. B
upvoted 1 times
...
BiteSize
1 year, 9 months ago
Selected Answer: B
Application whitelisting = best defense Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 2 times
...
blehbleh
1 year, 11 months ago
Selected Answer: B
Application allow list is an active way to approach defense.
upvoted 2 times
...
Cosmic_robot
2 years ago
Selected Answer: B
Application allow list (whitelist / permit list) is really the only "active" approach you can take defensively in regard to zero-day or unknown malware. This is actively lowering the vectors of attack through possible malicious software being downloaded.
upvoted 2 times
...
rmwilsn
2 years ago
Selected Answer: B
Come on ya'll, it's B.
upvoted 3 times
...
last_resort
2 years ago
Selected Answer: B
B....application allow list. This is an active control. The vote percentages are skewed for this question because people are not selecting a "voting comment"
upvoted 3 times
...
josepa
2 years, 1 month ago
B, thats correct
upvoted 2 times
josepa
2 years, 1 month ago
https://www.comparitech.com/net-admin/application-whitelisting-guide/#:~:text=Application%20whitelisting%20is%20a%20powerful,where%20maximum%20security%20is%20required.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago