exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 226 discussion

Actual exam question from CompTIA's CAS-004
Question #: 226
Topic #: 1
[All CAS-004 Questions]

A server in a manufacturing environment is running an end-of-life operating system. The vulnerability management team is recommending that the server be upgraded to a supported operating system, but the ICS software running on the server is not compatible with modem operating systems. Which of the following compensating controls should be implemented to BEST protect the server?

  • A. Application allow list
  • B. Antivirus
  • C. HIPS
  • D. Host-based firewall
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
FoxTrotDG
Highly Voted 2 years, 1 month ago
Selected Answer: A
I'm going with A. It directly addresses the risk of unauthorized application execution on the end-of-life operating system. C and D may not be as effective in protecting against zero-day exploits or targeted attacks that exploit vulnerabilities in an end-of-life operating system
upvoted 11 times
Ariel235788
1 year, 6 months ago
Fully agree, and ChatGPT does as well
upvoted 2 times
...
...
Steel16
Most Recent 2 months ago
Selected Answer: D
o The best compensating control to implement on this server is a host-based firewall. o A host-based firewall provides an additional layer of security directly on the server itself. It can filter incoming and outgoing network traffic based on predefined rules, effectively blocking malicious connections and preventing unauthorized access. This is crucial in this scenario where upgrading the operating system is not feasible due to compatibility issues with the ICS software. A host-based firewall can help isolate the server from the network and minimize the potential attack surface. It can also monitor for suspicious activity on the server itself.
upvoted 1 times
...
Chiaretta
2 months, 3 weeks ago
Selected Answer: C
I think the best answer to this question is HIPS
upvoted 1 times
...
EAlonso
9 months, 2 weeks ago
A. I like HIPS but in an ICS the servers need to be up and running.
upvoted 1 times
...
SangSang
10 months, 2 weeks ago
Selected Answer: A
Application allow list, network white list, ... are the most common compensating controls
upvoted 1 times
SangSang
10 months, 2 weeks ago
You done need to fight against virus or malware if they aren't allow to execute from the beginning
upvoted 1 times
...
...
ninjachuleta
10 months, 3 weeks ago
Selected Answer: C
Given the constraints of the industrial control system (ICS) software being incompatible with modern operating systems, the best compensating control to protect the server running the end-of-life operating system would be: C. HIPS (Host-based Intrusion Prevention System) HIPS monitors and analyzes network traffic and system activities on individual hosts to identify suspicious behavior and prevent unauthorized access or activities. It can provide additional protection against vulnerabilities in the end-of-life operating system by detecting and blocking malicious activities in real-time. This helps mitigate the risks associated with using an unsupported operating system while maintaining the necessary functionality for the ICS software to operate.
upvoted 1 times
...
loucrass
1 year ago
Selected Answer: C
The answer is (C) according to ChatGPT
upvoted 1 times
...
AlphaF0rce
1 year, 2 months ago
Selected Answer: A
A. Application allow list Based on the comments, this is the correct answer. Keywords: "BEST...compensating control".
upvoted 1 times
...
userguy890
1 year, 2 months ago
Selected Answer: A
The only thing that protects against 0 days in the list. It is the best option. idk why there are split voting on this...
upvoted 2 times
...
ElDirec
1 year, 2 months ago
Selected Answer: A
Application allow list: This control focuses on restricting the execution of unauthorized applications, including potential malware, on the server. This is particularly relevant in ICS environments where security needs prioritize known and authorized software for process control and stability.
upvoted 2 times
...
Blingy
1 year, 2 months ago
Throwing my weight towards A too
upvoted 1 times
...
Desparate2Pass
1 year, 3 months ago
Selected Answer: A
Going with A. You need to isolate the server to only perform what is absolutely necessary to best mitigate against Zero Day Attacks. A HIPS recognizes signatures but does not offer best protection against Zero Day.
upvoted 1 times
...
hb0011
1 year, 3 months ago
Selected Answer: A
Yep it's A
upvoted 1 times
...
Trap_D0_r
1 year, 3 months ago
Selected Answer: C
It is absolutely C. The Server is EOL, and you're stuck with it (can't upgrade). It may already have a host based firewall, it may not. Regardless, a HIPS is a comprehensive solution to secure a piece of legacy hardware that you can't get rid of without crippling your "manufacturing environment." Don't listen to everyone voting for A or D, they are lying to you. Or illiterate. Or both.
upvoted 3 times
ddcnsd65
1 year ago
If you read the question correctly you'd know The server is "NOT" end of life, the "Operating System" is "END OF LIFE"
upvoted 1 times
...
...
abrub
1 year, 3 months ago
Selected Answer: C
Its C, HIPS. A HIPS is the best tool available here by a mile. Application allow list? Doesn't do anything to stop an attack, only prevents users from installing malware. Antivirus? Not comprehensive enough. Host-based firewall? Not effective at actively detecting and stopping threats. It's C 1000%.
upvoted 2 times
...
Delab202
1 year, 3 months ago
Selected Answer: D
Implementing a host-based firewall is a crucial compensating control to enhance the security of a server, especially in a situation where the operating system cannot be upgraded due to compatibility issues with ICS software. Here are some key considerations for implementing a host-based firewall: Chat GPT
upvoted 2 times
...
Anarckii
1 year, 3 months ago
Selected Answer: D
Controlled Network Access: A host-based firewall can be configured to control and restrict network traffic to and from the server. This helps in preventing unauthorized access and potential network attacks. Filtering Inbound and Outbound Traffic: The firewall can be configured to allow only necessary inbound and outbound network traffic, blocking any attempts by malicious actors to exploit vulnerabilities in the outdated operating system. Protecting Against Exploits: If there are known vulnerabilities in the end-of-life operating system that cannot be patched, a host-based firewall can act as a barrier, preventing exploitation of these vulnerabilities by filtering malicious traffic. Enhancing Security Posture: While not a substitute for upgrading the operating system, a host-based firewall adds an additional layer of defense by controlling network communication. It helps in reducing the attack surface and mitigating the risks associated with running an outdated OS.
upvoted 2 times
Anarckii
1 year, 3 months ago
Changing to C as we want to focus on possible attack. Firewalls aren't always protective against attacks so a step forward is HIPS
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago