exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 359 discussion

Actual exam question from CompTIA's CAS-004
Question #: 359
Topic #: 1
[All CAS-004 Questions]

A company is deploying multiple VPNs to support supplier connections into its extranet applications. The network security standard requires:

• All remote devices to have up-to-date antivirus
• A HIDS
• An up-to-date and patched OS

Which of the following technologies should the company deploy to meet its security objectives? (Choose two.)

  • A. NAC
  • B. WAF
  • C. NIDS
  • D. Reverse proxy
  • E. NGFW
  • F. Bastion host
Show Suggested Answer Hide Answer
Suggested Answer: AE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
IT_Master_Tech
6 months, 3 weeks ago
ChatGPT goes with A and F.
upvoted 1 times
...
23169fd
9 months, 3 weeks ago
Selected Answer: AE
NAC helps enforce security policies by ensuring that devices meet certain security criteria before they are allowed to connect to the network. This can include checking for up-to-date antivirus software, HIDS, and ensuring the operating system is patched. NGFWs provide advanced security features beyond traditional firewalls, including intrusion prevention, application awareness, and deep packet inspection.
upvoted 2 times
...
Anarckii
1 year, 4 months ago
Selected Answer: AE
A. NAC E. NGFW
upvoted 4 times
...
OdinAtlasSteel
1 year, 5 months ago
A. NAC (Network Access Control): NAC can enforce security policies on devices attempting to access the network. It can check for antivirus software, the presence of a HIDS, and the status of the OS before allowing devices to connect to the network. E. NGFW (Next-Generation Firewall): NGFWs can inspect and control network traffic based on security policies. They can enforce policies related to antivirus checks, intrusion detection, and other security measures, helping to ensure that remote devices meet the specified security requirements.
upvoted 2 times
...
ThatGuyOverThere
1 year, 6 months ago
Selected Answer: AF
I think AF is the best answer. NAC and NDFW do not satisfy the HIDS requirement. Bastion hosts, however, should include a HIDS on them as a best practice. NAC will satisfy the other two requirements. NGFW doesn't bring anything to the table the NAC doesn't cover for these requirements.
upvoted 3 times
...
weaponxcel
1 year, 6 months ago
Selected Answer: AE
A. NAC and E. NGFW. NAC (Network Access Control) is a technology that enforces security policies on devices that are connecting to a network. NAC can be used to ensure that all remote devices have up-to-date antivirus, a HIDS, and an up-to-date and patched OS. NGFW (Next-Generation Firewall) is a firewall that provides advanced security features, such as intrusion detection and prevention, application control, and web filtering. NGFW can be used to protect the extranet applications from attack.
upvoted 1 times
...
32d799a
1 year, 6 months ago
Selected Answer: AE
A. NAC (Network Access Control): NAC solutions can check the security posture of a device before allowing it access to the network. E. NGFW (Next-Generation Firewall): These are advanced firewalls that can incorporate features such as intrusion prevention, application filtering, and even some NAC-like capabilities. F. Bastion host: A bastion host is a special-purpose computer on a network that is designed to withstand attacks. It's typically used for secure remote access, but it doesn't enforce client device security posture.
upvoted 2 times
...
CXSSP
1 year, 7 months ago
Selected Answer: AE
NAC (Network Access Control): This can enforce policies to ensure that remote devices meet the specified requirements, including having up-to-date antivirus, an HIDS, and an up-to-date and patched OS. NGFW (Next-Generation Firewall): NGFWs provide advanced security features that can inspect traffic, detect and prevent malware, and enforce security policies. This helps in ensuring that traffic from remote devices meets the specified security requirements.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago