exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 223 discussion

Actual exam question from CompTIA's CAS-004
Question #: 223
Topic #: 1
[All CAS-004 Questions]

An organization is moving its intellectual property data from on premises to a CSP and wants to secure the data from theft. Which of the following can be used to mitigate this risk?

  • A. An additional layer of encryption
  • B. A third-party, data integrity monitoring solution
  • C. A complete backup that is created before moving the data
  • D. Additional application firewall rules specific to the migration
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
OneSaint
Highly Voted 2 years, 2 months ago
Selected Answer: A
Data should be encrypted for any migration to the cloud.
upvoted 5 times
...
Steel16
Most Recent 2 months ago
Selected Answer: A
o An additional layer of encryption is the best option to mitigate the risk of intellectual property theft when moving data to a Cloud Service Provider (CSP) because it adds another layer of security to protect sensitive information from unauthorized access.  Encryption: Encrypting data means transforming it into a scrambled code that can only be deciphered with a specific decryption key, making it unreadable to unauthorized parties.  Additional layer: Adding an extra layer of encryption on top of existing security measures within the CSP further enhances data protection.  Focus on detection: While data integrity monitoring can detect changes to data after it has been encrypted, it may not prevent the initial theft of the unencrypted data during the migration process.
upvoted 1 times
...
a18733c
5 months, 1 week ago
Selected Answer: D
The answer is D. The question asks to prevent theft, not to make data that was stolen useless. A poor question that tests reading comprehension, but not security.
upvoted 1 times
...
SangSang
10 months, 2 weeks ago
Selected Answer: A
Homomorphic encryption, same with 221
upvoted 1 times
...
Blingy
1 year, 2 months ago
Data should be encrypted, so that even if it’s stolen, it will be useless because it cannot be decrypted.
upvoted 1 times
...
CraZee
1 year, 3 months ago
Just a question...if the mitigation request is for theft, why is D not a consideration? I understand what POWNED said about B and the data integrity, but the way I read it, access to steal the data is different from access to read the data. A and B prevent the data from being accessed, but not stolen. C seems like a wasted option.
upvoted 1 times
CraZee
1 year, 3 months ago
From an online search: File Integrity Monitoring is a crucial tool for protecting sensitive data from cyber threats. By monitoring changes to files and alerting administrators to unauthorized changes, FIM can prevent cyber criminals from stealing or manipulating data. Still having difficulty seeing how it prevents theft, but seems like that is the answer...
upvoted 1 times
...
...
ThatGuyOverThere
1 year, 6 months ago
Selected Answer: A
Encryption is the way to go. Data integrity is about the reliability of the data, not it being stolen. Ensuring the data is sufficiently encrypted means it should be inaccessible even if you miss something and some of the data gets out.
upvoted 2 times
...
POWNED
1 year, 6 months ago
Selected Answer: B
Your going to want to use a CASB, in other words B. Sucks that these last 100+ questions have little comments, and people commenting that do not know what they are talking about.
upvoted 2 times
Fragmenttt
1 year, 6 months ago
Data integrity monitoring only ensures data is not changed on manipulated, has nothing to do with preventing theft.
upvoted 1 times
POWNED
1 year, 6 months ago
"Data integrity is often required by laws and regulations, such as HIPAA and GDPR, to protect sensitive information and prevent unauthorized access or manipulation of data."
upvoted 1 times
POWNED
1 year, 6 months ago
"Prevent unauthorized access" I would categorize that as preventing theft
upvoted 1 times
...
...
...
Luxury
1 year, 6 months ago
Right the remainder of the exam dump is like this! I’m hoping my exam only includes the first 100.
upvoted 1 times
...
...
OneSaint
2 years, 2 months ago
When data is being migrated from on-premises to Cloud, It should be encrypted .
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago