exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 175 discussion

Actual exam question from CompTIA's CAS-004
Question #: 175
Topic #: 1
[All CAS-004 Questions]

A company was recently infected by malware. During the root cause analysis, the company determined that several users were installing their own applications.
To prevent further compromises, the company has decided it will only allow authorized applications to run on its systems. Which of the following should the company implement?

  • A. Signing
  • B. Access control
  • C. HIPS
  • D. Permit listing
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ddcnsd65
6 months, 3 weeks ago
I think the answer is B Allow List, Permit List An Allow List also know as a "Permit List" or (deprecated White List) is a list of entities that are considered trustworthy and are granted access or privileges. They can be used to authenticate users managing Firewalls as these IP addressess can be allowed to manage this Firewall. Other times Allow List/Permit List allow users to "permit" certain software (applications) to run on a computer system while all others are blocked.
upvoted 3 times
...
ThatGuyOverThere
1 year ago
Selected Answer: D
Signing won't do anything without something to permit and deny based on the signed publisher. I work with application control and I never hear it referred to as "permit listing". I think the answer's wording is bad but I think this is the right choice.
upvoted 1 times
tefyayaydu
1 year ago
I agree. Think this is just a question to force CompTIA's own made-up terminology down peoples' throats.
upvoted 1 times
...
...
BiteSize
1 year, 3 months ago
Selected Answer: D
permit only what is allowed = Whitelisting permit listing = Application White listing/Application Control Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 3 times
...
Geofab
1 year, 7 months ago
Selected Answer: D
D is the correct answer
upvoted 2 times
...
EZPASS
1 year, 9 months ago
D is the correct answer.
upvoted 2 times
...
FOURDUE
1 year, 9 months ago
Selected Answer: A
Code signing is designed to provide a mechanism by which software can be verified to come from a trusted source. The presence of a code signature does not offer guarantees of code quality as it simply validates the originator. Verifying the originator of software can help measure its trustworthiness and can be used as a means to restrict software from running on a host, for example blocking any unsigned software from running or specifying that only software from a predefined set of signors can be used.
upvoted 1 times
FOURDUE
1 year, 9 months ago
I would like to officially change my answer to D.. sheesh..
upvoted 1 times
...
FOURDUE
1 year, 9 months ago
The Official CompTIA CASP+ Student Guide (Exam CAS-004) p 242
upvoted 1 times
...
...
Mr_BuCk3th34D
1 year, 10 months ago
Selected Answer: D
Permit listing or allow list (former whitelist)
upvoted 4 times
...
hidady
1 year, 10 months ago
D is the correct answer
upvoted 1 times
...
Ckl22
1 year, 12 months ago
Selected Answer: A
signing - signed application code From Official Cert Guide- Unsigned applications are code that cannot be verified to be what it purports to be or to be free of malware. While many unsigned applications present absolutely no security issues, most enterprises wisely choose to forbid their installation. MDM software and security settings in the devices themselves can be used to prevent installation of unsigned apps.
upvoted 1 times
Protocol0
1 year, 12 months ago
My problem with "signing" is that it is still has the potential of unwanted software. Like installing a signed app that comes bundled with McAfee (trellix) whatever they are called now. Which isn't technically malware, but it could interfere with the enterprises AV solution. Which is why I believe D is the answer.
upvoted 3 times
...
...
ryanzou
2 years ago
Selected Answer: D
D is my answer
upvoted 2 times
...
[Removed]
2 years ago
Selected Answer: D
Allow list, also known as a Permit List or (deprecated: White List), this list will only allow certain software to run on a computer and block any other application from being installed
upvoted 3 times
...
JohnWH
2 years ago
Whitelisting is a network security approach that blocks resource access to all but a select few trusted entities. Also referred to as permit lists, allowlists, or passlists, whitelists can contribute to your access control strategy by making highly sensitive resources harder for adversaries to penetrate. - google
upvoted 1 times
...
sh4dali
2 years ago
Code signing occurs when code creators digitally sign executables and scripts so that the user installing the code can be assured that it comes from the verified author.
upvoted 1 times
youngprinceton
2 years ago
just say the answer
upvoted 4 times
...
...
Cosmic_robot
2 years, 1 month ago
They are talking code signing
upvoted 1 times
...
dangerelchulo
2 years, 2 months ago
Selected Answer: D
This answer make no sense and i can't get a valid definition for them. My best guess is permit listing is the same as white listing, if it is then D is the correct answer since is exactly what the question is asking. If someone has some ideas as to what application signing is please share
upvoted 2 times
okguy
2 years, 2 months ago
i would have to assume they mean digital signatures?
upvoted 1 times
dangerelchulo
2 years, 2 months ago
event if it is digital signature when they are authorizing and preventing it should be white and black listing but then again this Comptia question are never the best to understand
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago