CAS-004 Exam QuestionsBrowse all questions from this exam

CAS-004 Exam - Question 269


An architect is designing security scheme for an organization that is concerned about APTs. Any proposed architecture must meet the following requirements:

• Services must be able to be reconstituted quickly from a known-good state.

• Network services must be designed to ensure multiple diverse layers of redundancy.

• Defensive and responsive actions must be automated to reduce human operator demands.

Which of the following designs must be considered to ensure the architect meets these requirements? (Choose three.)

Show Answer
Correct Answer: BCEFH

To ensure security and meet the requirements for handling advanced persistent threats (APTs), three key designs must be considered: Geographic distribution of critical data and services to ensure redundancy and quick recovery from known-good states across multiple locations, Hardened and verified container usage to secure, isolate services, and enable rapid reconstitution, and Implementation and configuration of a SOAR (Security Orchestration, Automation, and Response) system to automate defensive and responsive actions, thus reducing human operator demands.

Discussion

11 comments
Sign in to comment
2CU8Options: BEH
Apr 11, 2023

The designs that must be considered to ensure the architect meets these requirements are: Network services must be designed to ensure multiple diverse layers of redundancy. Establishment of warm and hot sites for continuity of operations. Implementation and configuration of a SOAR (Security Orchestration, Automation and Response) system to automate defensive and responsive actions to reduce human operator demands. Heterogeneous architecture refers to the use of different types of hardware and software in a system. It is not related to the design of network services to ensure multiple diverse layers of redundancy.

32d799aOptions: BCH
Oct 14, 2023

Geographic distribution of critical data and services - This ensures redundancy and helps in quickly recovering from a known good state if one location gets compromised; Hardened and verified container usage - Containers can be reconstituted quickly, and if they are hardened and verified, they are resistant to compromise; Implementation and configuration of a SOAR (Security Orchestration, Automation, and Response) - This primarily deals with the automation of defensive and responsive actions, making it relevant to the third requirement.

OdinAtlasSteelOptions: BCH
Dec 6, 2023

Unless that ATP is planning to magically summon a tornado to destroy your office, I don't see how establishing a Hot/Warm Site is going to do anything to help you. For that reason, my answer is B, C, H.

BiteSizeOptions: BEH
Jul 19, 2023

Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)

Alex_2169
Oct 1, 2023

when you use chat GPT make sure you use version 4.0 and to ask to give the answer according to comptia this makes a big difference in answers

CraZee
Jan 24, 2024

I just ran it against GPT 3.5 and was given BCH...maybe due to the 6 months of data collected for processing...

ThatGuyOverThere
Oct 31, 2023

What 32d799a said.

ThatGuyOverThereOptions: BCH
Oct 31, 2023

What 32d799a said.

last_resortOptions: FGH
Apr 11, 2023

F. Heterogeneous architecture - vendor diversity for redundancy G. Deployment of IPS services that can identify and block malicious traffic- to defend H. Implementation and configuration of a SOAR- for automation of recover

last_resort
Apr 12, 2023

Disregard heterogeneous architecture pls!!

last_resort
Apr 12, 2023

Changing my third option to C, containerization.

javier051977Options: BCH
Apr 11, 2023

B, C, and H are the most appropriate designs to ensure that the architect meets the requirements. B. Geographic distribution of critical data and services will ensure that multiple sites are available to restore data and services in the event of an APT attack. This will also reduce the impact of DDoS attacks by ensuring that traffic is spread across multiple sites. C. Hardened and verified container usage can help to isolate services from one another and protect them from APT attacks. Containerization can provide a secure and scalable platform for deploying services, which can be reconstituted quickly from a known-good state. H. Implementation and configuration of a SOAR platform will automate the process of responding to and mitigating APT attacks. The SOAR platform will allow the organization to create a set of automated actions that can be executed in response to security events, reducing the human operator demands.

AlizadehOptions: BCH
Apr 29, 2023

Based on the provided requirements, the following designs should be considered to ensure the architect meets the organization's needs:

p1s3cOptions: ABH
May 9, 2023

A. Increased efficiency by embracing advanced caching capabilities B. Geographic distribution of critical data and services H. Implementation and configuration of a SOAR Explanation: A: Advanced caching can be used to improve the speed of reconstitution from a known-good state, which is one of the requirements. B: Geographic distribution of critical data and services can be used to ensure multiple diverse layers of redundancy. H: The implementation and configuration of a SOAR (Security Orchestration, Automation and Response) can help automate defensive and responsive actions, thereby reducing the demands on human operators.

23169fdOptions: BCH
Jul 15, 2024

B. Geographic distribution of critical data and services Ensures redundancy and resilience by distributing data and services across multiple locations, reducing the impact of localized failures or attacks. C. Hardened and verified container usage Facilitates quick reconstitution of services from known-good states using secure, consistent container images. H. Implementation and configuration of a SOAR (Security Orchestration, Automation, and Response) Automates defensive and responsive actions, reducing human operator demands and ensuring rapid, consistent responses to security incidents.