exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 265 discussion

Actual exam question from CompTIA's CAS-004
Question #: 265
Topic #: 1
[All CAS-004 Questions]

A new mandate by the corporate security team requires that all endpoints must meet a security baseline before accessing the corporate network. All servers and desktop computers are scanned by the dedicated internal scanner appliance installed in each subnet. However, remote worker laptops do not access the network regularly. Which of the following is the BEST option for the security team to ensure remote worker laptops are scanned before being granted access to the corporate network?

  • A. Implement network access control to perform host validation of installed patches.
  • B. Create an 802.1X implementation with certificate-based device identification.
  • C. Create a vulnerability scanning subnet for remote workers to connect to on the network at headquarters.
  • D. Install a vulnerability scanning agent on each remote laptop to submit scan data.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
p1s3c
Highly Voted 1 year, 12 months ago
Selected Answer: D
D. Install a vulnerability scanning agent on each remote laptop to submit scan data. Since remote worker laptops do not access the network regularly, installing a vulnerability scanning agent on each remote laptop to submit scan data would be the best option for the security team to ensure that remote worker laptops are scanned before being granted access to the corporate network. This way, each laptop will be scanned and evaluated for compliance with the security baseline before it is allowed to access the corporate network, regardless of its location. Network access control, 802.1X implementation, and a vulnerability scanning subnet are all viable solutions, but they would require remote workers to be connected to the corporate network, which may not always be possible or practical.
upvoted 9 times
...
BreakOff874
Highly Voted 2 years ago
Selected Answer: D
D. Install a vulnerability scanning agent on each remote laptop to submit scan data is the BEST option for the security team to ensure remote worker laptops are scanned before being granted access to the corporate network. Since the remote worker laptops do not access the network regularly, options A, B, and C would not be effective as they rely on network access and connectivity to perform scanning or validation. Option D, on the other hand, involves installing a scanning agent on each remote laptop, which would allow the security team to collect vulnerability data and validate if the endpoint meets the security baseline before granting network access. This solution provides a comprehensive approach to ensure the security of remote laptops before accessing the corporate network.
upvoted 6 times
...
Bright07
Most Recent 1 month, 3 weeks ago
Selected Answer: D
Agent-based scanning operates regardless of network connection status, solving the remote access issue. The agent can perform regular scans locally and submit results when connectivity is available. This approach ensures continuous compliance monitoring without requiring regular network access. The agent can also be configured to restrict network access if compliance issues are detected, enforcing the security baseline requirement. A scanning agent installed on each remote laptop can perform regular vulnerability scans and submit the results to the corporate security team, ensuring compliance with the security baseline before granting network access. This approach works regardless of the laptop's location or connection frequency.
upvoted 1 times
...
Chiaretta
3 months, 1 week ago
Selected Answer: A
Network Access Control (NAC) is the most effective solution to ensure that remote worker laptops are scanned and compliant with the security baseline before accessing the corporate network. While vulnerability scanner agent ensures visibility into device compliance, it does not enforce restrictions on non-compliant devices when accessing corporate network.
upvoted 2 times
...
Bright07
3 months, 4 weeks ago
Selected Answer: D
Ans is D Here is why Install a Vulnerability Scanning Agent on Each Remote Laptop: By deploying a vulnerability scanning agent on each remote laptop, you can ensure that these devices are regularly scanned for compliance with security baselines, even when they are not connected to the corporate network. The agent can perform scans locally and then submit the results to the corporate security infrastructure when the laptop connects to the network. This method ensures that security baselines are checked regardless of the device's location. A. Implement network access control to perform host validation of installed patches: Network access control (NAC) is excellent for enforcing security policies but generally requires the device to be connected to the corporate network. For remote workers who may not connect frequently, this approach would not be as effective.
upvoted 1 times
...
deeden
4 months, 4 weeks ago
Selected Answer: A
Network Access Control (NAC) is the most effective solution to ensure that remote worker laptops are scanned and compliant with the security baseline before accessing the corporate network. While vulnerability scanner agent ensures visibility into device compliance, it does not enforce restrictions on non-compliant devices when accessing corporate network.
upvoted 3 times
...
881cfb8
5 months ago
Selected Answer: A
Part 1. A new mandate by the corporate security team requires that all endpoints must meet a security baseline before accessing the corporate network. Mandate states you gota be up to a level to join. NAC... Part 2. Of question wants the best method in relation to Part one. NAC The vulnerable scan would just say yep the pc isn't up to snuff and leave you there. NAC would deny entry as mandated or also offer remediation
upvoted 4 times
...
Bright07
8 months, 2 weeks ago
Ans is D Here is why Install a Vulnerability Scanning Agent on Each Remote Laptop: By deploying a vulnerability scanning agent on each remote laptop, you can ensure that these devices are regularly scanned for compliance with security baselines, even when they are not connected to the corporate network. The agent can perform scans locally and then submit the results to the corporate security infrastructure when the laptop connects to the network. This method ensures that security baselines are checked regardless of the device's location. A. Implement network access control to perform host validation of installed patches: Network access control (NAC) is excellent for enforcing security policies but generally requires the device to be connected to the corporate network. For remote workers who may not connect frequently, this approach would not be as effective.
upvoted 1 times
...
ninjachuleta
10 months, 3 weeks ago
Selected Answer: A
A. NAC
upvoted 2 times
...
loucrass
1 year ago
Selected Answer: D
Answer is (D) according to ChatGPT
upvoted 2 times
...
surfuganda
1 year, 1 month ago
Selected Answer: D
Falling back on reading comprehension here: Question asks: [...BEST option...to ensure...scanned BEFORE...access to...network?] Translation: scan first, connect second A. INCORRECT [connect first] B. INCORRECT [connect first] C. INCORRECT [connect first] D. CORRECT [scan first]
upvoted 4 times
...
hb0011
1 year, 3 months ago
Selected Answer: A
It worries me that so many people voted for anything other than A.
upvoted 5 times
userguy890
1 year, 2 months ago
its cause they blindly go for chatpgt replies.
upvoted 3 times
...
...
bdlm
1 year, 5 months ago
Selected Answer: A
Not only is this a great use case for NAC but how is the vulnerability scanner getting the latest plugins if the machine is offline for a long period of time?
upvoted 6 times
...
ThatGuyOverThere
1 year, 6 months ago
Selected Answer: A
I gotta agree with the others that say this is what NAC was made for and is the best answer.
upvoted 6 times
...
Meep123
1 year, 7 months ago
Selected Answer: A
Reasoning in previous comment
upvoted 2 times
...
Meep123
1 year, 7 months ago
A NAC is there to inspect a device before it is allowed to connect to the corporate network. If the device does not pass inspection, it is not allowed access. Submitting a scan sounds good, but what are the criteria for submitting the results? Within 24 hours? 72 hours? 1 week? How does the vuln scanner get on the device, does it have to connect to the corporate network for the security team to install it? If so, access to the corporate network has already began before the vuln scanner has had the opportunity to produce results. What about allowed configurations, versions of software, etc? With these variables, a NAC is something I'm more comfortable with. Vuln scanner is awesome, but I'd say thats 1 step different from what the question is asking.
upvoted 3 times
...
CoinUmbrella
1 year, 7 months ago
Selected Answer: D
Vulnerability Scanning Agent: Installing a vulnerability scanning agent on each remote laptop allows for remote scanning of these devices. This approach ensures that the laptops are scanned for compliance with the security baseline before they connect to the corporate network. The agent can periodically conduct scans and report the results to a centralized system for assessment. It's a proactive way to ensure that remote devices meet security requirements.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago