Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CS0-002 topic 1 question 72 discussion

Actual exam question from CompTIA's CS0-002
Question #: 72
Topic #: 1
[All CS0-002 Questions]

A company stores all of its data in the cloud. All company-owned laptops are currently unmanaged, and all users have administrative rights. The security team is having difficulty identifying a way to secure the environment. Which of the following would be the BEST method to protect the company's data?

  • A. Implement UEM on all systems and deploy security software.
  • B. Implement DLP on all workstations and block company data from being sent outside the company.
  • C. Implement a CASB and prevent certain types of data from being downloaded to a workstation.
  • D. Implement centralized monitoring and logging for all company systems.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
kiduuu
Highly Voted 1 year ago
Selected Answer: A
UEM stands for Unified Endpoint Management. It is a comprehensive approach to manage and secure all types of endpoint devices (such as laptops, mobile phones, and tablets) in an organization from a single console. UEM software provides capabilities such as device management, security management, application management, content management, and data protection for all endpoints, regardless of the operating system and device ownership model. In the scenario described in the question, implementing a CASB to prevent certain types of data from being downloaded to a workstation may be a valid solution, but it may not address the issue of unmanaged laptops and users with administrative rights. Implementing UEM (Unified Endpoint Management) on all systems and deploying security software could help address these issues by allowing the security team to manage and secure all endpoints, enforce security policies, and monitor and respond to security incidents in real-time
upvoted 10 times
grelaman
7 months, 2 weeks ago
B. Implement DLP on all workstations and block company data from being sent outside the company.: this solutions are primarily designed to protect data from unauthorized access and transfer (data exfiltration) while it is still on the endpoint device or in transit. DLP won't be able to do much to prevent the access to the data that is already stored in the cloud if a malicious actor gains access with the proper credentials or permissions using those laptops which already have administrative rights. Forthermore, users with administrative privileges can disable the DLP in those devices.
upvoted 1 times
...
grelaman
7 months, 2 weeks ago
3. Administrative Rights: By using UEM, you can restrict administrative rights for users. Giving all users administrative rights can be a significant security risk, as it allows them to make changes that could compromise the system. With UEM, you can implement the principle of least privilege, ensuring that users have only the necessary permissions.
upvoted 1 times
...
Noragretz
8 months, 3 weeks ago
ChatGPT agrees with this answer and I do too
upvoted 1 times
...
Rori791
9 months, 1 week ago
I agree with this, but difference between the votes is too huge… I’ve read the comments here & searched about it and I’m still unconvinced why a lot of people voted for C. CASB doesn’t address the root cause of the problem, which is that all company owned laptops are currently unmanaged, and all users have administrative rights. UEM will provide a complete visibility and control over all company-owned laptops, regardless of their location, and enforce security policies such as disabling administrative rights, enforcing data encryption, and enforcing the installation of security software.
upvoted 2 times
...
...
fablus78
Highly Voted 1 year, 7 months ago
Selected Answer: C
Cloud Access Security Broker (CASB): An enterprise management software designed to mediate access to cloud services by users across all types of devices
upvoted 9 times
...
anhod1578
Most Recent 1 month, 1 week ago
Selected Answer: A
(Unified Endpoint Management): UEM provides centralized management of all company endpoints, including laptops, desktops, tablets, and mobile devices. (Cloud Access Security Broker): A CASB can provide visibility and control over cloud services used by the organization. However, it wouldn't directly address the security vulnerabilities on unmanaged laptops and user administrative rights.
upvoted 1 times
...
RobV
4 months ago
C. Implement a CASB and prevent certain types of data from being downloaded to a workstation. Implement UEM on all systems and deploy security software (Option A): - While Unified Endpoint Management (UEM) and security software are important components of a security strategy, they might not be sufficient on their own to address the specific concerns of data protection in a cloud-centric environment. Implement a CASB and prevent certain types of data from being downloaded to a workstation (Option C): - Cloud Access Security Broker (CASB) solutions are designed to protect data as it moves between on-premises and cloud environments. By implementing a CASB, the company can enforce policies that prevent certain types of data from being downloaded to unmanaged workstations, providing a more granular and cloud-focused approach to data protection.
upvoted 1 times
...
edro
4 months, 3 weeks ago
As analysts, we face many issues in our day to day, prioritizing asset matters. While managing devices is necessary, prioritizing the protection of the Confidentiality, Integrity, and Availability (CIA) of the data is paramount. Given that the data is stored in the cloud, implementing a CASB solution becomes instrumental in addressing and enhancing the overall protection of the data.
upvoted 1 times
...
grelaman
7 months, 2 weeks ago
Selected Answer: A
The problem is shown from the perspective that the primary concern is to protect the company's data from unsafe company-owned laptops, then the best approach would involve addressing the vulnerabilities that could come up from those laptops. In this case, option A would be the most suitable. 1. Unified Endpoint Management (UEM): Implementing UEM allows for centralized control and management of all company-owned laptops. This includes enforcing security policies, ensuring software is up to date, and remotely wiping or locking devices if they are lost or compromised. 2. Deploying Security Software: Deploying security software, including antivirus, anti-malware, and firewall solutions, is essential for protecting laptops from various threats. It can help detect and prevent malware infections and other security risks.
upvoted 2 times
grelaman
7 months, 2 weeks ago
3. Administrative Rights: By using UEM, you can restrict administrative rights for users. Giving all users administrative rights can be a significant security risk, as it allows them to make changes that could compromise the system. With UEM, you can implement the principle of least privilege, ensuring that users have only the necessary permissions.
upvoted 1 times
grelaman
7 months, 2 weeks ago
B. Implement DLP on all workstations and block company data from being sent outside the company.: this solutions are primarily designed to protect data from unauthorized access and transfer (data exfiltration) while it is still on the endpoint device or in transit. DLP won't be able to do much to prevent the access to the data that is already stored in the cloud if a malicious actor gains access with the proper credentials or permissions using those laptops which already have administrative rights. Forthermore, users with administrative privileges can disable the DLP in those devices.
upvoted 1 times
grelaman
7 months, 2 weeks ago
C. Implement a CASB and prevent certain types of data from being downloaded to a workstation. This solutions are intended to provide control access (Accounting), compliance, Threat protection, encryption of the data transferd and DLP to the services that a company has in the cloud. if a laptops have administrative permissions and falls into malicious hands, it can potentially undermine some of the security controls implemented by a CASB. An malicious actor can bypass or disable the security mesures provided by this solutions.
upvoted 1 times
...
...
...
...
buchhe
8 months, 1 week ago
Selected Answer: C
A cloud security broker, or cloud access security broker (CASB), is a software layer that operates as a gatekeeper between an organization’s on-premises network and the provider’s cloud environment. It can provide many services in this strategic position like: 1. Compliance 2. Data security 3. Threat protection and 4. Data loss prevention
upvoted 2 times
...
POWNED
8 months, 4 weeks ago
It is A (UEM). Look at the big picture! UEM is a comprehensive tool which will solve all the issues mentioned in the question.
upvoted 2 times
...
HotWings8
9 months, 2 weeks ago
I have selected C - Theres a reason it included "A Company stores all it's data in the cloud"
upvoted 1 times
...
msyusa
1 year ago
answer is A: DLP can be bypassed or disabled by an authorized user who has administrative rights. C: CASB :: can help protect data in the cloud, but it does not address the issue of unmanaged laptops or users with administrative rights.
upvoted 3 times
...
aSBhbSBnYXk=
upvoted 1 times
...
aSBhbSBnYXk=
upvoted 1 times
...
Snkrsnaker1
1 year ago
Answer is B. The question is asking the best way to protect the company's data. The arguments for B or C are pretty good but we have to look at it from the scope of this course. CASB for the sake of this course is there to manage access to the cloud, where DLP's purpose is for protecting data. The best way to protect the data is to manage those laptops and implement DLP on all of them. CASB won't protect the data, think of them as security at the front door. Its a deterrent vs a preventative measure. I hope this helps.
upvoted 1 times
...
Jacobmy98
1 year ago
Selected Answer: C
An advantage of using a CASB for enforcement in DLP policies is that it is built for cloud security. A CASB will examine the traffic to and from a cloud application and enforce DLP policies for those cloud services.
upvoted 1 times
...
Stiobhan
1 year, 1 month ago
Selected Answer: B
CASB and DLP are both very viable but because of its wider reach I am going to go with DLP - https://www.nextdlp.com/resources/blog/casb-vs-dlp-whats-the-difference#:~:text=The%20main%20difference%20between%20a,premises%2C%20or%20stored%20in%20endpoints.
upvoted 1 times
...
tatianna
1 year, 1 month ago
Chat gpt The BEST method to protect the company's data in this scenario would be to implement UEM (Unified Endpoint Management) on all systems and deploy security software. By doing so, the security team can enforce policies, manage software, and secure endpoints to protect against potential data breaches. Additionally, implementing DLP (Data Loss Prevention) and a CASB (Cloud Access Security Broker) can provide additional layers of security, but those would be secondary to deploying UEM and security software to protect the unmanaged laptops. Centralized monitoring and logging is also an essential practice to identify potential security incidents, but it is not a solution to secure the environment.
upvoted 3 times
...
2Fish
1 year, 1 month ago
Selected Answer: C
C. Originally I kinda though DLP maybe, but B is the best answer for this question. One of CASB functionality is to mitigate Data exfiltration.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...