exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 332 discussion

Actual exam question from CompTIA's CAS-004
Question #: 332
Topic #: 1
[All CAS-004 Questions]

A small company recently developed prototype technology for a military program. The company’s security engineer is concerned about potential theft of the newly developed, proprietary information.

Which of the following should the security engineer do to BEST manage the threats proactively?

  • A. Join an information-sharing community that is relevant to the company.
  • B. Leverage the MITRE ATT&CK framework to map the TTP.
  • C. Use OSINT techniques to evaluate and analyze the threats.
  • D. Implement a network-based intrusion detection system.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Leroy_24
2 weeks ago
Selected Answer: B
Similar to #16
upvoted 1 times
...
grelaman
7 months, 3 weeks ago
Selected Answer: A
You don't know the kind of adversary that you are protecting from, that is why a choose: Information Sharing and Analysis Centers (ISACs) or similar communities are industry-specific groups where organizations share threat intelligence, vulnerabilities, and best practices. Why not MITRE ATTACK: It helps in understanding and responding to attacks rather than proactively preventing them. Requires significant effort to map and apply TTPs to the company's context.
upvoted 3 times
...
Bright07
8 months ago
Ans A. The question says manage the threat proactively not reactively. So with this, Information Sharing: Joining a relevant information-sharing community (such as an Information Sharing and Analysis Center or industry-specific security groups) allows the company to stay informed about emerging threats, vulnerabilities, and attack vectors that are pertinent to their sector. This is the answer to the question. This proactive approach helps in understanding and preparing for threats that may specifically target their technology or industry. While on the other hand, B. Leverage the MITRE ATT&CK framework to map the TTPs (Tactics, Techniques, and Procedures): This is useful for understanding potential attack methods and improving defensive strategies, but it’s more about reacting to known threats rather than proactively managing threats.
upvoted 3 times
...
1aab10b
1 year, 1 month ago
Selected Answer: B
repeated question 16.
upvoted 3 times
...
Remmmie
1 year, 3 months ago
Selected Answer: A
This was on my CYSA+ exam, i picked A then, not if i got it or not but... oh well. I'll pick it again.
upvoted 3 times
Remmmie
1 year, 3 months ago
I pick A because of "for a military" program. Those are usually classified and stuff...
upvoted 1 times
e020fdc
1 year, 2 months ago
Classified or no, the military still uses MITRE ATT&CK to protect networks and information.
upvoted 1 times
...
...
...
Anarckii
1 year, 4 months ago
Selected Answer: B
Leverage the MITRE ATT&CK framework to map the TTP. He is just concerned about theft and wants to know how to protect against it, PROACTIVE APPROACH - MITRE ATT&CK
upvoted 1 times
...
ThatGuyOverThere
1 year, 6 months ago
Selected Answer: B
I would say direct information on known tactics of data exfiltration would be better than an information sharing community.
upvoted 1 times
...
weaponxcel
1 year, 6 months ago
Selected Answer: B
B. Leverage the MITRE ATT&CK framework to map the TTPs. The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations. It can be used to map the tactics, techniques, and procedures (TTPs) that are most likely to be used to target the company's proprietary information. Once the TTPs have been mapped, the security engineer can develop and implement countermeasures to mitigate the risks. For example, if the security engineer identifies that the company is at risk of a spear-phishing attack, they can implement security awareness training for employees and deploy email filtering solutions. Why A. Join an information-sharing community that is relevant to the company is not correct: Joining an information-sharing community can be helpful for staying up-to-date on the latest threats and trends. However, it is not a substitute for mapping the TTPs that are most likely to be used to target the company's proprietary information.
upvoted 2 times
...
32d799a
1 year, 6 months ago
Selected Answer: B
A small company recently developed prototype technology for a military program. The company’s security engineer is concerned about potential theft of the newly developed, proprietary information. Which of the following should the security engineer do to BEST manage the threats proactively? A. Join an information-sharing community that is relevant to the company. B. Leverage the MITRE ATT&CK framework to map the TTP. C. Use OSINT techniques to evaluate and analyze the threats. D. Implement a network-based intrusion detection system.
upvoted 1 times
...
Ariel235788
1 year, 7 months ago
Of course ChatGPT is being WEIRD AF. I posted Q17 (its verbatim to this Q) and then ChatGPT changed its answer to B....
upvoted 1 times
GoME123
1 year, 4 months ago
Different answer options...
upvoted 1 times
...
...
Ariel235788
1 year, 7 months ago
Selected Answer: A
A. Join an information-sharing community that is relevant to the company. Joining an information-sharing community that is relevant to the company is the best proactive approach to managing threats related to potential theft of proprietary information. Information-sharing communities, often established for specific industries or sectors, facilitate the exchange of threat intelligence and cybersecurity information among member organizations. By participating in such a community, the small company can gain access to timely threat intelligence, indicators of compromise (IoCs), and best practices for protecting their proprietary technology. This enables the company to stay informed about emerging threats and take proactive measures to secure their intellectual property. While leveraging the MITRE ATT&CK framework, using OSINT techniques, and implementing a network-based intrusion detection system are all valuable security practices, they may not be as effective in proactively managing threats related to the specific context of potential theft of newly developed proprietary information for a military program.
upvoted 3 times
...
CoolCat22
1 year, 7 months ago
Selected Answer: B
It company owned, you dont wana share secrets with your competitors
upvoted 1 times
...
CoinUmbrella
1 year, 7 months ago
Selected Answer: A
Join an information-sharing community that is relevant to the company
upvoted 3 times
...
CXSSP
1 year, 8 months ago
Selected Answer: B
I'm voting B but can someone tell me why it's not A?
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago