exam questions

Exam CAS-003 All Questions

View all questions & answers for the CAS-003 exam

Exam CAS-003 topic 1 question 29 discussion

Actual exam question from CompTIA's CAS-003
Question #: 29
Topic #: 1
[All CAS-003 Questions]

After embracing a BYOD policy, a company is faced with new security challenges from unmanaged mobile devices and laptops. The company's IT department has seen a large number of the following incidents:
✑ Duplicate IP addresses
✑ Rogue network devices
✑ Infected systems probing the company's network
Which of the following should be implemented to remediate the above issues? (Choose two.)

  • A. Port security
  • B. Route protection
  • C. NAC
  • D. HIPS
  • E. NIDS
Show Suggested Answer Hide Answer
Suggested Answer: BC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Trap_D0_r
Highly Voted 4 years, 3 months ago
A,C The question specifically mentions laptops. Even though no one does it anymore, this question is definitely assuming you are physically plugging in your BYOD device. Port Security will prevent rogue devices on the hardline network, and everything else is covered with a NAC.
upvoted 6 times
D1960
3 years, 10 months ago
The question specifically mentions "mobile devices and laptops." So devices other than laptops - like phones - also need to be considered.
upvoted 1 times
...
Trap_D0_r
4 years, 3 months ago
Port security with dynamic ARP inspection and trusted ports will also prevent MitM attacks. You can use Port security to prevent anyone from impersonating your DHCP server by only allowing DISCOVER and REQUEST messages upstream to the DHCP server and only allowing OFFER and ACKNOWLEDGE messages downstream to the nodes. This is effective on both wifi and wired networks.
upvoted 1 times
D1960
4 years ago
But MitM is not mentioned in the question.
upvoted 1 times
...
D1960
3 years, 10 months ago
Will you have to re-configure your port security for every new BYOD device? That would be awfully cumbersome if new BYOD devices were being introduced all the time. I am not sure how port security is supposed to work for wireless devices. I thought port security was configured on a switch, whereas wireless devices typically use WAPs.
upvoted 1 times
...
...
D1960
4 years, 3 months ago
The question mentions the following three issues: - Duplicate IP addresses - Rogue network devices - Infected systems probing the company's network I think a NAC will take care of the first two on wired or wireless. In fact, I think a NAC would take care of all three. I think a problem with port security might be: all new BYOD devices would be rejected. So every time a guest comes into your organization, you would have to reconfigure the port security. If you have a lot of guests, that could be a real issue. A NIDS would help with unauthorized probing.
upvoted 1 times
...
americaman80
4 years ago
I think you are right
upvoted 1 times
...
...
tirajvid
Most Recent 1 year, 4 months ago
Selected Answer: CE
I feel : A. Port security - Its not practical to use or manage Port security when unknown BYOD devices are allowed to connect to the network daily. B. Route protection - Not sure how this helps C. NAC - This will assist in preventing access to sensitive areas of the network D. HIPS - IT can not deploy software to privately owned devices E. NIDS - This will assist in detecting probing and unauthorised access to sensitive areas of the network.
upvoted 1 times
...
Turbowet
3 years, 2 months ago
Selected Answer: BC
hmmm i concur with B C
upvoted 1 times
...
aghoistion
3 years, 2 months ago
Selected Answer: BC
Route protection: secure router to be configurable with two routes – one for sign-in and one for unauthorized access. A NAC system can deny network access to non-compliant devices, place them in a quarantined area, or give them only restricted access to computing resources, thus keeping insecure nodes from infecting the network.
upvoted 1 times
...
D1960
3 years, 10 months ago
HIPS not NIDS. The infected devices would be inside the network perimeter. NIDS is for detecting attacks from outside the perimeter. "The problem is not with your firewall or your network intrusion prevention system. These network-level security devices are designed for perimeter protection, and by definition they cannot stop attacks that originate inside your network." https://www.secureworks.com/blog/why-hips The article linked to above gives a fairly good argument for HIPS.
upvoted 1 times
...
D1960
3 years, 10 months ago
Mabye: C. NAC and D. HIPS ? The NAC will keep unauthorized systems off the network. HIPS will prevent any unauthorized actions, such as probing.
upvoted 1 times
...
boblee
4 years, 7 months ago
i'd go with C&E
upvoted 3 times
TheThreatGuy
4 years, 3 months ago
Disagree because NIDS will not mitigate the problem. It will only help detect it, but they are already doing that..... port security will help get rid of rogue endpoints, NAC can be used to scan hosts and only allow hosts who comply with NAC policy.
upvoted 2 times
...
...
loco123
5 years ago
I think port security would have something to do with this. If port security is good to go, then users cant connect to that port
upvoted 2 times
qwertybob
4 years, 11 months ago
I would go with port security and NAC. Port security will stop duplicate IP and rogue devices. Only allowed MAC addresses will be able to connect. NAC will stop infected systems due to their infections.
upvoted 2 times
ruch19
4 years, 10 months ago
but port security will not work for wifi (mobile and laptop on wifi)?
upvoted 3 times
D1960
4 years, 6 months ago
Are you sure that port security will not work for wifi? There is another question where that is also at issue.
upvoted 1 times
...
...
...
...
tek
5 years, 2 months ago
C. NAC will deal with duplicate IPs and Rogue devices. When properly configured a Network Access Control solution will authenticate and authorize compliant devices. E. NIDS - Network intrusion detection will help the probing of the company's network.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...