Free CAS-004 Exam Braindumps (page: 20)

Page 20 of 159

A company wants to protect its intellectual property from theft. The company has already applied ACLs and DACs.
Which of the following should the company use to prevent data theft?

  1. Watermarking
  2. DRM
  3. NDA
  4. Access logging

Answer(s): B



A satellite communications ISP frequently experiences outages and degraded modes of operation over one of its legacy satellite links due to the use of deprecated hardware and software. Three days per week, on average, a contracted company must follow a checklist of 16 different high-latency commands that must be run in serial to restore nominal performance. The ISP wants this process to be automated.
Which of the following techniques would be BEST suited for this requirement?

  1. Deploy SOAR utilities and runbooks.
  2. Replace the associated hardware.
  3. Provide the contractors with direct access to satellite telemetry data.
  4. Reduce link latency on the affected ground and satellite segments.

Answer(s): A



A company processes data subject to NDAs with partners that define the processing and storage constraints for the covered data. The agreements currently do not permit moving the covered data to the cloud, and the company would like to renegotiate the terms of the agreements.
Which of the following would MOST likely help the company gain consensus to move the data to the cloud?

  1. Designing data protection schemes to mitigate the risk of loss due to multitenancy
  2. Implementing redundant stores and services across diverse CSPs for high availability
  3. Emulating OS and hardware architectures to blur operations from CSP view
  4. Purchasing managed FIM services to alert on detected modifications to covered data

Answer(s): A



Ransomware encrypted the entire human resources fileshare for a large financial institution. Security operations personnel were unaware of the activity until it was too late to stop it. The restoration will take approximately four hours, and the last backup occurred 48 hours ago. The management team has indicated that the
RPO for a disaster recovery event for this data classification is 24 hours.
Based on RPO requirements, which of the following recommendations should the management team make?

  1. Leave the current backup schedule intact and pay the ransom to decrypt the data.
  2. Leave the current backup schedule intact and make the human resources fileshare read-only.
  3. Increase the frequency of backups and create SIEM alerts for IOCs.
  4. Decrease the frequency of backups and pay the ransom to decrypt the data.

Answer(s): C






Post your Comments and Discuss CompTIA CAS-004 exam with other Community members:

CAS-004 Exam Discussions & Posts