exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 307 discussion

Actual exam question from CompTIA's CS0-002
Question #: 307
Topic #: 1
[All CS0-002 Questions]

A Chief Information Officer wants to implement a BYOD strategy for all company laptops and mobile phones. The Chief Information Security Officer is concerned with ensuring all devices are patched and running some sort of protection against malicious software. Which of the following existing technical controls should a security analyst recommend to BEST meet all the requirements?

  • A. EDR
  • B. Port security
  • C. NAC
  • D. Segmentation
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
dickchappy
1 year, 7 months ago
Selected Answer: A
This question is about preventing non compliant devices from connecting to a network. NAC is literally designed for this purpose. It is shocking to me that people are saying A. EDR is mostly used for detecting malicious behavior happening on an endpoint, and while it is useful it won't be helping you ensure they have antivirus and up to date patches when connecting to your network, which is what the question is asking.
upvoted 1 times
dickchappy
1 year, 7 months ago
Meant to select C
upvoted 1 times
...
...
johndoe69
1 year, 10 months ago
Selected Answer: C
Network access control (NAC) solutions enable an organization to restrict unauthorized or non-compliant devices and users from accessing the corporate network. This helps to ensure that all devices connected to the corporate network are compliant with corporate security policies. In addition, continuously checking device compliance is a core requirement for any organization’s Zero Trust Security model. - CheckPoint
upvoted 1 times
...
JoInn
2 years, 2 months ago
Selected Answer: A
Malwarebytes reports: "Two of the top BYOD security tools include Endpoint Detection and Response (EDR) solutions and Managed Detection and Response (MDR) services."
upvoted 2 times
...
NerdAlert
2 years, 2 months ago
Selected Answer: C
After checking the book, and mainly Jason Dion Course - Module 44: NAC Configuration, NAC is the technical control we want. The Network Access Control Posture Assessment can include antivirus scans and OS patches as part of the health policy compliance needed to join the network.
upvoted 2 times
...
Gaven
2 years, 3 months ago
Selected Answer: C
Its BYOD so you would want to use NAC to verify antimalware was running before giving them network access. Not sure you could do EDR on a BYOD endpoint.
upvoted 2 times
...
2Fish
2 years, 3 months ago
Selected Answer: C
C. With the phrase "running some sort of protection against malicious software.." tells me that EDR is not the choice and NAC is the better solution. If we are saying EDR, then is that company providing the EDR solution? Just my thoughts.
upvoted 2 times
...
db97
2 years, 4 months ago
A NAC will ensure that a device is patched and running an antimalware software. I bet for C as the right answer.
upvoted 3 times
...
Stiobhan
2 years, 4 months ago
Selected Answer: A
Defo A - EDR. Defender for Endpoint - I use it everyday. NAC is also good but EDR wins it.
upvoted 1 times
...
catastrophie
2 years, 4 months ago
Selected Answer: C
With NAC you can enforce 802.1X EAP and other authentication requirements before connecting to the network.
upvoted 3 times
...
Cock
2 years, 4 months ago
Selected Answer: C
Endpoint Detection and Response (EDR) is a security solution that is used to detect and respond to malicious activity on endpoints, such as laptops and mobile devices. While EDR can be an important component of a security strategy for BYOD devices, it is not the only solution that would be needed to meet the requirements stated by the Chief Information Officer and the Chief Information Security Officer. Other controls, such as Network Access Control (NAC) and Mobile Device Management (MDM), would also be needed to ensure that all devices are patched and protected against malicious software.
upvoted 1 times
...
fermins
2 years, 4 months ago
Selected Answer: C
EDRs can not be installed on BYOD devices. NAC seems like the logical solution as it enforces policies, patches and configurations on BYOD devices
upvoted 1 times
...
gnnggnnggnng
2 years, 5 months ago
Selected Answer: A
The security analyst should recommend Endpoint Detection and Response (EDR) as a technical control for the BYOD strategy. EDR provides visibility into the endpoints and allows security personnel to monitor, detect, and respond to threats on these devices in real-time. This will help ensure that all devices are running the latest security patches and have protection against malicious software, which will meet the requirements of the Chief Information Security Officer
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...