exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 539 discussion

Actual exam question from CompTIA's CAS-004
Question #: 539
Topic #: 1
[All CAS-004 Questions]

A security analyst is investigating unapproved cloud services that are being used in the organization. Which of the following would best allow for discovery of shadow IT?

  • A. Monitoring for sign-up emails of cloud services
  • B. Centralizing WAF deployment in the data center
  • C. Setting up a reverse proxy and web filtering software
  • D. Performing attack surface analysis
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
grelaman
6 months, 3 weeks ago
Selected Answer: C
I think that a Proxy server would be more suitable definition than a Reverse proxy which is basically a load balancer. The other options don't apply for this problem.
upvoted 2 times
...
hisamdavid
9 months ago
Selected Answer: C
bro why A, what if I use my personal email to register u can't detect that, better answer is C my brothers in security
upvoted 4 times
SangSang
8 months, 2 weeks ago
In that case, it is not become the company assets, it is your personal. Some email security solutions like Avanan can detects the Shadow IT based on the inspection of sign-up external services
upvoted 2 times
...
...
tony_wang99
9 months, 1 week ago
Selected Answer: C
C. Setting up a reverse proxy and web filtering software A reverse proxy and web filtering software can help monitor and control outbound web traffic. By inspecting the traffic, these tools can identify and log connections to cloud services that are not officially sanctioned by the organization. This allows the security analyst to discover and assess unapproved cloud services being accessed by users.
upvoted 3 times
...
PluDou_111
9 months, 2 weeks ago
Selected Answer: C
A reverse proxy and web filtering software can monitor and log all web traffic passing through the network. This allows for the detection of unapproved cloud services being accessed or used by employees. By inspecting the outbound traffic, it can identify patterns and connections to cloud services that are not sanctioned by the organization.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago