exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 56 discussion

Actual exam question from CompTIA's CAS-004
Question #: 56
Topic #: 1
[All CAS-004 Questions]

An organization is considering a BYOD standard to support remote working. The first iteration of the solution will utilize only approved collaboration applications and the ability to move corporate data between those applications. The security team has concerns about the following:
✑ Unstructured data being exfiltrated after an employee leaves the organization
✑ Data being exfiltrated as a result of compromised credentials
✑ Sensitive information in emails being exfiltrated
Which of the following solutions should the security team implement to mitigate the risk of data loss?

  • A. Mobile device management, remote wipe, and data loss detection
  • B. Conditional access, DoH, and full disk encryption
  • C. Mobile application management, MFA, and DRM
  • D. Certificates, DLP, and geofencing
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
[Removed]
Highly Voted 2 years, 6 months ago
Selected Answer: C
This is a tricky question from CompTIA, at least not as stupid as other questions. It's definitely C because MAM software secures and enables IT to control over enterprise applications on end users' corporate and personal smartphones and tablets and allows for selective wipes when the person leaves the organization. MFA will help with compromised credentials and finally DRM will provide us with Email DRM Protection as Senders should be able to stop recipients from forwarding sensitive messages or downloading confidential documents locally. https://www.virtru.com/blog/drm-protection
upvoted 11 times
...
great_lake1231
Highly Voted 2 years, 9 months ago
C; sounds like DRM, MFA, and application management to me
upvoted 6 times
...
Bright07
Most Recent 3 months, 3 weeks ago
Selected Answer: A
Mobile Device Management (MDM): MDM allows the organization to control and manage employee-owned devices. With MDM, the organization can enforce security policies, monitor device usage, and manage the applications installed on the device. This helps prevent unauthorized access to corporate data and reduces the risk of data being exfiltrated after an employee leaves the organization. Remote Wipe: This feature enables the organization to remotely erase all corporate data from a device if it is lost, stolen, or if the employee leaves the company. This helps ensure that unstructured corporate data, which may be stored locally on the device, is not accessible after the employee departs, mitigating the risk of data exfiltration. Data Loss Detection (DLP): DLP policies can be applied to detect and prevent unauthorized transfers of sensitive data (e.g., email attachments or files shared via collaboration apps). These policies can identify potential data exfiltration attempts, whether they are intentional or the result of compromised credentials.
upvoted 2 times
...
23169fd
9 months, 3 weeks ago
Selected Answer: C
Mobile Application Management (MAM): MAM allows the organization to control and secure the applications used on employees' personal devices. It ensures that only approved collaboration applications are used and that corporate data is managed securely within those apps. Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring multiple forms of verification before granting access to corporate applications and data. This helps mitigate the risk of data exfiltration due to compromised credentials. Digital Rights Management (DRM): DRM helps protect sensitive information by controlling how data can be accessed, used, and shared. It ensures that data remains protected even if it is moved between approved applications or if an employee leaves the organization.
upvoted 2 times
...
Remmmie
1 year, 2 months ago
Selected Answer: A
DLP is important in data exfiltration...
upvoted 3 times
...
Anarckii
1 year, 4 months ago
Selected Answer: C
"approved collaboration applications"
upvoted 1 times
...
BiteSize
1 year, 9 months ago
Selected Answer: C
C. MAM is limiting the "Work" side of the phone, MFA to get after people have left, but DRM will have to utilize features to prevent exfiltration. (wish it said DLP) You would not remote wipe employee's or former employee's personal phones so A is not the answer. DNS over HTTPS (DoH) is only for 443 but has nothing to do with the concerns in the question Certificates, DLP seem to be kinda on point but geofencing and certificates don't really get after all of the concerns. Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 5 times
...
sadamishspic
2 years, 1 month ago
Selected Answer: C
BYOD, MDM and MAM are the key indicators. "One significant way that MAM is different than MDM is that MAM does not need control over the device. MAM ensures that sensitive data is not sent or copied to other applications. Employees using their own devices feel more at ease with MAM, as it has less control over their entire device than MDM software." They described collaboration applications on BYOD.
upvoted 4 times
...
smqzbq
2 years, 1 month ago
Selected Answer: A
A DLP should protect from "Data being exfiltrated as a result of compromised credentials" DRM will not.
upvoted 2 times
...
FOURDUE
2 years, 3 months ago
Selected Answer: C
i do not think it is D because of the use of geofencing. Geofencing is a location-based technology service in which a mobile, desktop or cloud-based app or other software uses GPS, RFID, Wi-Fi or cellular data to trigger a pre-programmed action when a mobile device or RFID tag or mobile device enters or exits a virtual boundary set up around a geographical location, known as a geofence. DRM is a broad term describing many different technical formats, it always includes some form of digital padlock on the file. These locks are called "license encryption keys" (complex mathematical codes), which prevent anyone from using or copying the file. People who pay for these encryption license keys receive unlock codes to use the file for themselves, but they are usually not allowed to share the file with other people. we are only concerned with the first iteration of the solution: utilize ONLY approved collaboration applications and the ability to move corporate data between those applications.
upvoted 3 times
FOURDUE
2 years, 3 months ago
we do not need remote wipe. only concerned about data between applications.. DRM solves this. MAM is what it is application management on mobile devices. MFA solves credentialing.
upvoted 1 times
...
...
Mr_BuCk3th34D
2 years, 4 months ago
Selected Answer: A
MDM is a set of tools and practices that are used to manage and secure mobile devices that are used in a BYOD environment. By implementing MDM, the security team can ensure that only approved collaboration applications are installed on the devices, and can enforce policies to ensure that corporate data is handled securely. Remote wipe is a feature that allows the security team to remotely delete all data from a device if it is lost or stolen. This can help to prevent sensitive data from being exfiltrated after an employee leaves the organization, as the security team can remotely wipe the device to ensure that no sensitive data is left on it. Data loss detection is a security feature that is designed to detect and alert the security team when sensitive data is being exfiltrated from the organization. This can help to prevent data from being exfiltrated as a result of compromised credentials or other types of data leakage.
upvoted 3 times
FOURDUE
2 years, 3 months ago
managing BYOD devices in our cloud environment, we are not concerned with wiping the entire device. Just the data the application is utilizing and controlling that data. DRM does this. Remote wipe is overkill.
upvoted 1 times
...
...
John199506
2 years, 4 months ago
Selected Answer: A
The question is very straightforward for me. Sensitive information being exfiltrated by email will be detected by DLP
upvoted 2 times
...
romero318
2 years, 8 months ago
This is very confusing because a previous question that kind of relates to this question tells us to do remote wipe.
upvoted 1 times
...
Boats
2 years, 8 months ago
Selected Answer: C
I select C because a MAM is concerned about corporate applications and not the whole device.
upvoted 4 times
...
Big_Harambe
2 years, 9 months ago
I could pitch either A, C, or D... screw comptia
upvoted 4 times
2d4687f
1 year, 11 months ago
Hilarious
upvoted 1 times
...
...
EZPASS
2 years, 9 months ago
I also think the answer is C.
upvoted 3 times
...
great_lake1231
2 years, 9 months ago
I was going through these questions and actually answered D this time. Im inclined to agree with AlexJacobson and want to say D
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago