exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 385 discussion

Actual exam question from CompTIA's CAS-004
Question #: 385
Topic #: 1
[All CAS-004 Questions]

A security architect is designing a solution for a new customer who requires significant security capabilities in its environment. The customer has provided the architect with the following set of requirements:

• Capable of early detection of advanced persistent threats.
• Must be transparent to users and cause no performance degradation.
• Allow integration with production and development networks seamlessly.
• Enable the security team to hunt and investigate live exploitation techniques.

Which of the following technologies BEST meets the customer's requirements for security capabilities?

  • A. Threat Intelligence
  • B. Deception software
  • C. Centralized logging
  • D. Sandbox detonation
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
nuel_12
Highly Voted 1 year, 6 months ago
Selected Answer: B
B: Deception Software such as honeypot and honeynet which is capable of providing the following • Capable of early detection of advanced persistent threats. • Must be transparent to users and cause no performance degradation. • Allow integration with production and development networks seamlessly. • Enable the security team to hunt and investigate live exploitation techniques
upvoted 5 times
...
23169fd
Most Recent 11 months ago
Selected Answer: B
Early Detection of APTs: Deception technologies create fake assets and environments that lure attackers, allowing for early detection when these deceptive elements are accessed. Transparency to Users and No Performance Degradation: Deception technologies operate in the background, without impacting the performance of actual user-facing systems. Seamless Integration: They can be integrated into existing networks, both production and development, without significant changes or disruptions. Hunting and Investigation: Deception software allows security teams to monitor, analyze, and respond to attacks in real-time, providing detailed insights into exploitation techniques used by attacker
upvoted 2 times
...
041ba31
1 year ago
Selected Answer: B
The best answer is B. Deception software. Deception software can detect advanced persistent threats (APTs) early by creating decoys and traps that lure attackers into revealing their presence. It operates transparently to users and does not degrade performance. Additionally, it integrates seamlessly with production and development networks and enables the security team to hunt and investigate live exploitation techniques by analyzing the behavior of attackers who interact with the decoys.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...