exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 218 discussion

Actual exam question from CompTIA's CAS-004
Question #: 218
Topic #: 1
[All CAS-004 Questions]

An organization’s threat team is creating a model based on a number of incidents in which systems in an air-gapped location are compromised. Physical access to the location and logical access to the systems are limited to administrators and select, approved, on-site company employees. Which of the following is the BEST strategy to reduce the risks of data exposure?

  • A. NDAs
  • B. Mandatory access control
  • C. NIPS
  • D. Security awareness training
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
FOURDUE
Highly Voted 2 years, 2 months ago
Selected Answer: B
Mandatory Access Control (MAC) Mandatory Access Control (MAC) is based on the idea of security clearance levels. Rather than defining ACLs on resources, each object and each subject is granted a clearance level, referred to as a label. If the model used is a hierarchical one (that is, high clearance users are trusted to access low clearance objects), subjects are only permitted to access objects at their own clearance level or below. The labelling of objects and subjects takes place using pre-established rules. The critical point is that these rules cannot be changed by any subject account, and are therefore non-discretionary. Also, a subject is not permitted to change an objectʼs label or to change his or her own label.
upvoted 16 times
...
imather
Highly Voted 1 year, 9 months ago
Selected Answer: D
I'm going to say Security Awareness Training. NDA covers the legal ramifications of disclosure of information, not relevant. MAC is a technical control based on clearance levels and preventing unauthorized users from accessing information. However, logical controls are already in place. In addition, the concern is on compromising of systems. NIPS do not apply as it is airgapped. Security Awareness Training can better educate users which may be how incidents are occurring causing compromise of air-gapped systems.
upvoted 11 times
talosDevbot
1 year, 3 months ago
Key point in the question: "reduce the risk of data exposure". From the options, MAC is the best control to address that issue.
upvoted 3 times
...
...
chooksmagooks
Most Recent 2 weeks, 2 days ago
Selected Answer: B
Going with B. Security awareness training relies on compliance and is less effective against determined malicious insiders or sophisticated attacks compared to MAC, simply put, It's an administrative control. Mandatory Access Control enforces system-wide security policies that cannot be easily bypassed by users or determined human adversaries with access to the air-gapped environment.
upvoted 1 times
...
231354b
5 months, 2 weeks ago
Selected Answer: D
Given physical and logical access is already restricted to a select few, Awareness Training would be best option to reduce data exposure.
upvoted 1 times
...
grelaman
8 months, 1 week ago
Selected Answer: D
D. Security awareness training: Ensure that all personnel, including high-privilege users, are well-informed about the risks and best practices for handling sensitive information. Training can help mitigate risks associated with human error, insider threats or being part of a social engineering attack. Why not B (MAC): Because in environments air-gapped where administrators and approved personnel have high privileges, implementing Mandatory Access Control (MAC) may not fully address the issue if these users are granted extensive permissions.
upvoted 1 times
...
Bright07
9 months ago
MAC. Here is why, Mandatory access control: This is the most effective option because it enforces strict access policies based on predefined security labels and user roles. This approach ensures that only authorized personnel can access sensitive data, which is crucial in an air-gapped environment where data exposure must be minimized. D. Security awareness training: While this is important for informing employees about security policies and potential threats, it relies on human behavior and may not be sufficient alone to control access to sensitive data. Overall, implementing mandatory access control helps ensure that only authorized individuals have the necessary permissions to access sensitive systems and data, thereby significantly reducing the risk of data exposure in a highly controlled environment.
upvoted 1 times
...
EAlonso
10 months ago
D as B and A are probably in place.
upvoted 1 times
...
isaphiltrick
10 months ago
Selected Answer: B
In an air-gapped environment with limited physical and logical access, implementing Mandatory Access Control (MAC) is the best strategy to reduce the risks of data exposure. MAC enforces strict access controls based on the sensitivity of the information and the clearance level of the users, ensuring that only authorized individuals can access sensitive data. This approach provides a robust technical solution to protect against data breaches and unauthorized access.
upvoted 3 times
...
ninjachuleta
11 months ago
Selected Answer: B
B. Mandatory access control Mandatory access control (MAC) enforces restrictions on data access based on the security level assigned to users and the sensitivity of the information they are trying to access. It ensures that only authorized individuals can access specific data, even in highly restricted environments like air-gapped locations. This strategy complements the existing restrictions on physical and logical access and provides an additional layer of protection against unauthorized data exposure.
upvoted 2 times
...
e020fdc
1 year, 2 months ago
Selected Answer: D
I'm going with security awareness training. Question 211 discussion makes a good case for training to also be the answer here.
upvoted 2 times
...
hb0011
1 year, 3 months ago
Selected Answer: D
It's D. Mandatory Access Control. Just because they have good physical security doesn't stop someone without need to know from accessing the data. MAC would prevent that.
upvoted 3 times
...
Anarckii
1 year, 4 months ago
Selected Answer: B
the question says "BEST" just because you have training education programs doesn't mean employees are going fail to human error. You want to primarily focus on physical devices and protocols. Training should ALWAYS be last when implementing and enhancing security
upvoted 2 times
...
OdinAtlasSteel
1 year, 5 months ago
Selected Answer: D
Physical and logical access is already controlled, so MAC is a useless answer. Because the systems are already so secure and air-gapped, the only way to move forward from here is to use Security Awareness Training. D.
upvoted 1 times
...
POWNED
1 year, 7 months ago
Selected Answer: D
BEST strategy! What is the largest vulnerability in security... humans. Train your humans or bad things will happen.
upvoted 3 times
...
joinedatthehop
1 year, 7 months ago
Selected Answer: B
CompTIA CertMaster: Mandatory Access Control (MAC) is based on the idea of security clearance levels. Rather than defining ACLs on resources, each object and each subject is granted a clearance level, referred to as a label. If the model used is a hierarchical one (that is, high clearance users are trusted to access low clearance objects), subjects are only permitted to access objects at their own clearance level or below. The labelling of objects and subjects takes place using pre-established rules. The critical point is that these rules cannot be changed by any subject account, and are therefore non-discretionary. Also, a subject is not permitted to change an object's label or to change his or her own label.
upvoted 4 times
...
Uncle_Lucifer
1 year, 8 months ago
Selected Answer: D
After reviewing this again, it has to be Security Awareness Training. The system is limited to few staffs with specific roles. what is the need for MAC again when it is already limited to a niche? Well i will take the exam this thursday, and i al selecting "Security Awareness Training"
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago