exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 158 discussion

Actual exam question from CompTIA's CAS-004
Question #: 158
Topic #: 1
[All CAS-004 Questions]

An organization requires a legacy system to incorporate reference data into a new system. The organization anticipates the legacy system will remain in operation for the next 18 to 24 months. Additionally, the legacy system has multiple critical vulnerabilities with no patches available to resolve them. Which of the following is the BEST design option to optimize security?

  • A. Limit access to the system using a jump box.
  • B. Place the new system and legacy system on separate VLANs.
  • C. Deploy the legacy application on an air-gapped system.
  • D. Implement MFA to access the legacy system.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
adamwella
Highly Voted 2 years, 3 months ago
Not sure why this wouldn't be B. You would want to totally isolate and segregate the vulnerable host in efforts to minimize the potential risk that it poses on your network. Any thoughts ?
upvoted 8 times
deeden
1 month ago
I guess it depends on the business' risk appetite versus ease of use (integration). Both B and C can potentially be an answer.
upvoted 1 times
...
Emmasa
2 years, 2 months ago
I asked my self the same question. I would definitely go for B because it the option that makes sense the most
upvoted 4 times
...
FoxTrotDG
1 year, 9 months ago
This is likely the option I would select in a real-world setting. It's hard telling what CompTIA is wanting for an answer here. I could make an argument for A, B, and C.
upvoted 1 times
...
Andre876
2 years, 1 month ago
I believe it is B as well. segmenting the networks would give us the ability to apply ACL's to limit what devices have access and to what servcies. the jump box would work if a human was trying to access..in this case we just need the devices to communicate.
upvoted 5 times
...
...
BiteSize
Highly Voted 1 year, 5 months ago
Selected Answer: B
Lock down the VLANs to specific ports and ACLs to permit only one-way traffic as absolutely needed to receive the information. Jump box would be ideal, but sounds very manual, unlike what the question is getting after. Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 7 times
...
3041b53
Most Recent 1 week, 5 days ago
Selected Answer: B
If data flows between the legacy system and the new one needs to be exchanged, then the best option is to place them in different VLANs and restrict traffic by implementing ACLs.
upvoted 1 times
...
deeden
1 month ago
Selected Answer: C
I'm going to agree with C because most critical systems which have no patch or hard to patch are air-gapped (e.g. ICS, nuclear facility, power plant, power utility, etc.) do not take a chance if the risk is too great (meaning existential level or unrecoverable damage), even in a highly unlikely scenario.
upvoted 1 times
...
Bright07
2 months ago
The best design option to optimize security in this scenario is: B. Place the new system and legacy system on separate VLANs. The organization has a legacy system with critical vulnerabilities and no patches available. While the system is expected to remain operational for the next 18 to 24 months, it is important to minimize risk and segregate the vulnerable system from newer, more secure systems to prevent the vulnerabilities from being exploited. While C. Deploy the legacy application on an air-gapped system is a system that is physically isolated from other networks, making it harder to breach. This option can provide strong isolation, it may be unrealistic or impractical for a system that needs to communicate with a new system for reference data integration. The legacy system would need a secure method of exchanging data with the new system, which could complicate operations and integration. So, the best option is to place the legacy system and the new system on separate VLANs.
upvoted 1 times
...
Bright07
2 months ago
The best design option to optimize security in this scenario is: B. Place the new system and legacy system on separate VLANs. Explanation: The organization has a legacy system with critical vulnerabilities and no patches available. While the system is expected to remain operational for the next 18 to 24 months, it is important to minimize risk and segregate the vulnerable system from newer, more secure systems to prevent the vulnerabilities from being exploited. While deploy the legacy application on an air-gapped system is a system that is physically isolated from other networks, making it harder to breach. This option can provide strong isolation, it may be unrealistic or impractical for a system that needs to communicate with a new system for reference data integration. The legacy system would need a secure method of exchanging data with the new system, which could complicate operations and integration.
upvoted 1 times
...
23169fd
6 months ago
Selected Answer: C
This option provides the highest level of security by completely isolating the legacy system from any network threats. Given that there are no patches available for the critical vulnerabilities, an air-gapped system ensures that the legacy system is not accessible over the network, which is a strong measure to prevent exploitation. While it may complicate data transfer, secure methods such as encrypted USB drives or other physical transfer methods can be employed.
upvoted 2 times
...
vdizzle
9 months ago
Selected Answer: B
All day
upvoted 2 times
...
hb0011
1 year ago
Air gapped is not an option guys. It has to be able to communicate with other systems. You're not going to be walking to the system and downloading files to a thumb drive and walking them over to the other systems. That's ridiculous.
upvoted 4 times
userguy890
10 months, 3 weeks ago
its the best to optimize security though which the questions asks
upvoted 1 times
...
...
Anarckii
1 year ago
Selected Answer: C
I originally went with B as I have a networking background and have been enjoying BiteSize's explanations and answers, but comparing B and C you have to look at which one offers more security from what the question ask, "BEST". Segmenting from a separate VLAN is great and isolates the traffic, but does not potentially enhance the security. Currently learning about air-gapped system through this question, the characteristics that is offers is way better than just using a VLAN. Physical isolation, Network isolation, and enhanced security. VLANs only logically separate the connection, not physically. So with the side by side comparison I have to go with C
upvoted 4 times
...
biggytech
1 year, 1 month ago
Selected Answer: C
Keyword is "BEST" security optimization is what Comptia is going after here. Air gapping provides the BEST security compared to a vlan. However, a vlan is more practical irl
upvoted 2 times
...
OdinAtlasSteel
1 year, 1 month ago
Selected Answer: C
Air-Gapped System: An air-gapped system is physically isolated from other networks or systems, including the internet or external networks. This isolation significantly reduces the exposure to external threats and unauthorized access because there are no direct network connections to exploit the vulnerabilities. Data transfer into or out of the air-gapped system typically occurs through controlled means, such as manual transfers using physical media (e.g., USB drives) or dedicated secure channels. Limiting access with a jump box (Option A) might enhance access control, but if the legacy system remains vulnerable, unauthorized access could still lead to exploitation of the vulnerabilities. Placing systems on separate VLANs (Option B) is a network segmentation method that provides some isolation, but it might not offer sufficient protection against targeted attacks exploiting known vulnerabilities.
upvoted 2 times
...
saucehozz
1 year, 2 months ago
Selected Answer: B
[B]est answer. I had an elaborate case, but it was too long.
upvoted 4 times
saucehozz
1 year, 2 months ago
1. "legacy system to incorporate reference data into a new system" communication with new systems 2. "anticipates legacy system to remain operational for 18-24mo" indicates the legacy system is temporary 3. "critical vulnerabilities and no patches" separate it logically, physically, or both 4. "best design to optimize security" - see answer [B]
upvoted 2 times
saucehozz
1 year, 2 months ago
[A.] Bastion host is great for accessing the reference data. This highly hardened host wouldn't (theoretically) allow peripheral connections except for a smart card. How would #1 work? [B.] VLANs isolate traffic and resource communication between network devices, compartmentalizing specific systems and limiting the scope of potential attacks on the vulnerable system. Satisfies #1 with NACLs control traffic between VLANs, ports, and protocols. Satisfies #2 ease of reconfiguring a port. [C.] Migrating a legacy application to another system could be treacherous. CapEx to acquire new hardware and OpEx to maintain the new system goes up. How would #1 work? [D.] CapEx for MFA software and OpEx to operate the MFA are increased, which goes against #2. Doesn't address #1, #3, or #4.
upvoted 2 times
...
...
...
ThatGuyOverThere
1 year, 2 months ago
Selected Answer: C
"BEST" is relative. C is the most secure. Would it hamper the teams too much since they couldn't access it without direct access? Probably. But if best is the most secure, this is the right answer. In the real world the best answer would probably end up being A I would think.
upvoted 2 times
ThatGuyOverThere
1 year, 2 months ago
You know it does say "optimizing" which makes me lean toward A as the answer they want. It's hard to say without more specifics on what they are lookin for.
upvoted 1 times
...
...
nmap_king_22
1 year, 2 months ago
Selected Answer: C
C. Deploy the legacy application on an air-gapped system: This option is the most secure choice in the given context. An air-gapped system is physically isolated from the network, which means it's not connected to any other systems or networks, making it extremely difficult for attackers to access and exploit the vulnerabilities. This isolation helps protect the legacy system while still allowing it to fulfill its function of incorporating reference data into the new system. In the absence of patches for critical vulnerabilities, isolating the legacy system through an air-gapped setup is the best approach to optimize security and protect the organization's data and operations.
upvoted 3 times
...
32d799a
1 year, 3 months ago
Selected Answer: A
B. Place the new system and legacy system on separate VLANs: This would help to contain potential malicious activity. However, this alone does not eliminate the threat to the legacy system with critical vulnerabilities. A. Limit access to the system using a jump box: A jump box is a secure computer that administrators use to connect to other devices in a security zone. It's essentially a controlled access point. This solution would reduce the potential attack surface by limiting which users and systems can directly access the legacy system
upvoted 1 times
...
JackZ
1 year, 3 months ago
Selected Answer: C
C is physically isolating
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago