exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 474 discussion

Actual exam question from CompTIA's CAS-004
Question #: 474
Topic #: 1
[All CAS-004 Questions]

The information security manager at a 24-hour manufacturing facility is reviewing a contract for potential risks to the organization. The contract pertains to the support of printers and multifunction devices during non-standard business hours. Which of the following will the security manager most likely identify as a risk?

  • A. Print configurations settings for locked print jobs
  • B. The lack of an NDA with the company that supports its devices
  • C. The lack of an MSA to govern other services provided by the service provider
  • D. The lack of chain of custody for devices prior to deployment at the company
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
isaphiltrick
Highly Voted 10 months, 1 week ago
Selected Answer: B
The security manager at the manufacturing facility would most likely identify the lack of a Non-Disclosure Agreement (NDA) with the company supporting its printers and multifunction devices during non-standard business hours as a risk. Printers and multifunction devices often store sensitive information, such as documents that are scanned, printed, or faxed. Without an NDA in place, there is a risk that the service provider could access or inadvertently expose this sensitive information. This could potentially lead to breaches of confidentiality and compromise the security of the organization's data.
upvoted 5 times
Pesos
7 months, 2 weeks ago
Thanks ChatGPT we really needed this data. We couldn't get this data ourselves
upvoted 1 times
...
...
23169fd
Most Recent 9 months, 3 weeks ago
Selected Answer: B
In a manufacturing facility, especially one that operates 24 hours, ensuring that all devices have a verified and secure chain of custody is paramount. This ensures that devices have not been tampered with before they are deployed, which is crucial for maintaining the integrity and security of the operational environment. Without a secure chain of custody, there's a risk that devices could be compromised before they even reach the facility, leading to potential security breaches once they are in use.
upvoted 2 times
...
EAlonso
9 months, 3 weeks ago
Selected Answer: A
This is a common issue
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago