exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 606 discussion

Actual exam question from CompTIA's CAS-004
Question #: 606
Topic #: 1
[All CAS-004 Questions]

During an adversarial simulation exercise, an external team was able to gain access to sensitive information and systems without the organization detecting this activity. Which of the following mitigation strategies should the organization use to best resolve the findings?

  • A. Configuring a honeypot for adversary characterization
  • B. Leveraging simulators for attackers
  • C. Setting up a honey network for attackers
  • D. Utilizing decoy accounts and documents
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bright07
3 months ago
Selected Answer: D
Decoy accounts and documents are specifically designed to detect unauthorized access to sensitive data by luring attackers into interacting with fake resources. These accounts and documents appear legitimate, but they are carefully monitored. When attackers access them, it serves as a clear indicator of compromise, helping the organization detect and respond to malicious activity before real sensitive information is exposed.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago