Which of the following should be performed to ensure the users can access the network and meet the company’s security requirements?

A recent assessment identified that several users’ mobile devices are running outdated versions of endpoint security software that do not meet the company’s security policy. Which of the following should be performed to ensure the users can access the network and meet the company’s security requirements?
A. Vulnerability assessment
B. Risk assessment
C. Patch management
D. Device quarantine
E. Incident management

How to PASS CAS-004 in First Attempt?

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

7 thoughts on “Which of the following should be performed to ensure the users can access the network and meet the company’s security requirements?

  1. D is Correct

    Quarantining devices is the least administrative effort, because ‘an updated device will automatically’ be allowed to reconnect when it updates.

    A remediation server addresses the problems discovered on the device. It may remove the malware, install missing operating system updates, or update virus definitions. When the remediation process is complete, the device is granted full access to the network

    1
    3
  2. Duh, @Paul…Really..If you quarantine a device it won’t be able to access the internet OR anything for that matter. And if somehow it does, then it’s putting the company at risk because the outdated software (patches). Just like your computer at home.

  3. I was thrown off but outdated software is not patch management. Device could have been dormant but doesn’t mean it needs patches. D would be the best answer.

    1. Oh my…

      If the machine has been “dormant” that means it has been off…that literally means it needs patches! If the machine has been off, there you do not know if the OS is running outdated versions of the software. D is the worst answer.

      Its patch management.

      1
      1
  4. Patch management is probably the best answer.

    I could see an argument for device quarantine though, as that would let the device access the internet, however it would not let the device continue to access the company network.

    1. I would say it’s D

      To me, mentioning the existence of ‘security policy’ and ‘company security requirements’ tells me that a there’s probably a BYOD program here in play.

      Also, it specifically says “Which of the following should be performed to ensure the users can **access the network and meet the company’s security requirements**”, which in other words would be “access the network (get internet access) and update your software and meet the security requirements”.

      1. Your explanation has nothing to do with even answering incorrectly much less correctly.

        Its patch management.

        3
        1

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.