ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 99 - CAS-004 discussion

Report
Export

A company's claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee's laptop when was opened.

A.
Impalement application whitelisting and add only the email client to the whitelist for laptop in the claims processing department.
Answers
A.
Impalement application whitelisting and add only the email client to the whitelist for laptop in the claims processing department.
B.
Required all laptops to connect to the VPN before accessing email.
Answers
B.
Required all laptops to connect to the VPN before accessing email.
C.
Implement cloud-based content filtering with sandboxing capabilities.
Answers
C.
Implement cloud-based content filtering with sandboxing capabilities.
D.
Install a mail gateway to scan incoming messages and strip attachments before they reach the mailbox.
Answers
D.
Install a mail gateway to scan incoming messages and strip attachments before they reach the mailbox.
Suggested answer: C

Explanation:

Implementing cloud-based content filtering with sandboxing capabilities is the best solution for preventing malicious software installation on the employee's laptop due to opening an email attachment that appeared to be a claim form. Cloud-based content filtering is a technique that uses a cloud service to filter or block web traffic based on predefined rules or policies, preventing unauthorized or malicious access to web resources or services. Cloud-based content filtering can prevent malicious software installation on the employee's laptop due to opening an email attachment that appeared to be a claim form, as it can scan or analyze email attachments before they reach the mailbox and block or quarantine them if they are malicious. Sandboxing is a technique that uses an isolated or virtualized environment to execute or test suspicious or untrusted code or applications, preventing them from affecting the host system or network. Sandboxing can prevent malicious software installation on the employee's laptop due to opening an email attachment that appeared to be a claim form, as it can run or detonate email attachments in a safe environment and observe their behavior or impact before allowing them to reach the mailbox. Implementing application whitelisting and adding only the email client to the whitelist for laptops in the claims processing department is not a good solution for preventing malicious software installation on the employee's laptop due to opening an email attachment that appeared to be a claim form, as it could affect the usability or functionality of other applications on the laptops that may be needed for work purposes, as well as not prevent malicious software from running within the email client. Requiring all laptops to connect to the VPN (virtual private network) before accessing email is not a good solution for preventing malicious software installation on the employee's laptop due to opening an email attachment that appeared to be a claim form, as it could introduce latency or performance issues for accessing email, as well as not prevent malicious software from reaching or executing on the laptops. Installing a mail gateway to scan incoming messages and strip attachments before they reach the mailbox is not a good solution for preventing malicious software installation on the employee's laptop due to opening an email attachment that appeared to be a claim form, as it could affect the normal operations or functionality of email communication, as well as not prevent legitimate attachments from reaching the mailbox. Verified

Reference: https://www.comptia.org/blog/what-is-cloud-based-content-filtering https://partners.comptia.org/docs/default-source/resources/casp-content-guide

asked 02/10/2024
Dustin Sickle
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first