exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 142 discussion

Actual exam question from CompTIA's CAS-004
Question #: 142
Topic #: 1
[All CAS-004 Questions]

A security architect needs to implement a CASB solution for an organization with a highly distributed remote workforce. One of the requirements for the implementation includes the capability to discover SaaS applications and block access to those that are unapproved or identified as risky. Which of the following would BEST achieve this objective?

  • A. Deploy endpoint agents that monitor local web traffic to enforce DLP and encryption policies.
  • B. Implement cloud infrastructure to proxy all user web traffic to enforce DLP and encryption policies.
  • C. Implement cloud infrastructure to proxy all user web traffic and control access according to centralized policy.
  • D. Deploy endpoint agents that monitor local web traffic and control access according to centralized policy.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
23169fd
11 months, 3 weeks ago
Selected Answer: C
Cloud Infrastructure: Using a cloud-based proxy ensures that all web traffic, regardless of the user's location, is routed through a central point where policies can be enforced consistently. SaaS Application Discovery: The proxy can monitor and log all web traffic, enabling the discovery of all SaaS applications being accessed by users. Centralized Policy Enforcement: Centralized policies can be implemented to control access, allowing the organization to block access to unapproved or risky SaaS applications effectively. Scalability and Flexibility: A cloud-based solution is scalable and can easily accommodate a distributed workforce without the need for extensive on-premises infrastructure.
upvoted 2 times
...
EAlonso
11 months, 3 weeks ago
C is the best answer because the remote workforce and it is a standard.
upvoted 1 times
...
xped2
1 year, 9 months ago
C. Implement cloud infrastructure to proxy all user web traffic and control access according to centralized policy. In a highly distributed remote workforce scenario, implementing a cloud-based solution to proxy all user web traffic and control access according to centralized policy is the most effective approach. This approach allows for centralized control and policy enforcement across all remote users, regardless of their physical location or endpoint device. It also enables the discovery of SaaS applications and the ability to block access to unapproved or risky applications in a scalable and efficient manner. It doesn't rely on installing agents on individual endpoints, making it easier to manage and enforce security policies across a distributed workforce.
upvoted 1 times
...
BiteSize
1 year, 11 months ago
Selected Answer: C
CASB is vital for Cloud Mandatory Access Control for all cloud apps and services. Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 2 times
...
djash22
2 years, 4 months ago
Selected Answer: C
C is the best answer
upvoted 2 times
...
Serliop378
2 years, 4 months ago
Selected Answer: C
This is about identifying and blocking risky Saas access from the users.
upvoted 2 times
...
FOURDUE
2 years, 5 months ago
Selected Answer: C
CASBs provide you with visibility into how clients and other network nodes are using cloud services. Some of the functions of a CASB are: • Enable single sign-on authentication and enforce access controls and authorizations from the enterprise network to the cloud provider. • Scan for malware and rogue or non-compliant device access. • Monitor and audit user and resource activity. • Mitigate data exfiltration by preventing access to unauthorized cloud services from managed devices.
upvoted 3 times
...
AnnoyingIAGuy
2 years, 5 months ago
Selected Answer: C
B. I would say a proxy here works best
upvoted 1 times
AnnoyingIAGuy
2 years, 5 months ago
Typo. Answer should be C
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...