exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 330 discussion

Actual exam question from CompTIA's CAS-004
Question #: 330
Topic #: 1
[All CAS-004 Questions]

A recent security audit identified multiple endpoints have the following vulnerabilities:

• Various unsecured open ports
• Active accounts for terminated personnel
• Endpoint protection software with legacy versions
• Overly permissive access rules

Which of the following would BEST mitigate these risks? (Choose three).

  • A. Local drive encryption
  • B. Secure boot
  • C. Address space layout randomization
  • D. Unneeded services disabled
  • E. Patching
  • F. Logging
  • G. Removal of unused accounts
  • H. Enabling BIOS password
Show Suggested Answer Hide Answer
Suggested Answer: DEG 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CXSSP
Highly Voted 1 year, 5 months ago
Selected Answer: DEG
The vulnerabilities mentioned in the scenario pertain to various aspects of endpoint security. To mitigate these risks, the following actions should be taken: D. Unneeded services disabled: Disabling unnecessary services helps minimize the attack surface by reducing potential entry points for attackers. E. Patching: Regularly applying security patches ensures that vulnerabilities in the software are addressed, reducing the likelihood of exploitation. G. Removal of unused accounts: Deactivating or removing accounts for terminated personnel ensures that unauthorized individuals cannot access the system using those accounts.
upvoted 6 times
...
e020fdc
Most Recent 12 months ago
Selected Answer: DEG
Wow finally a straightforward "Choose 3" question.
upvoted 3 times
HappyG
11 months, 1 week ago
Only took 330 questions to finally get one! DEG!
upvoted 3 times
...
...
32d799a
1 year, 4 months ago
Selected Answer: DEG
Various unsecured open ports: These can be exploited by attackers to gain unauthorized access or to launch attacks. Solution: D. Unneeded services disabled. Active accounts for terminated personnel: These can be used for unauthorized access. Solution: G. Removal of unused accounts. Endpoint protection software with legacy versions: Outdated software may have known vulnerabilities that can be exploited. Solution: E. Patching.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...