Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CAS-004 Topic 2 Question 70 Discussion

Actual exam question for CompTIA's CAS-004 exam
Question #: 70
Topic #: 2
[All CAS-004 Questions]

During a recent breach, an attacker was able to get a user's login credentials by cracking a password that was retrieved via a stolen laptop. The attacker accessed the hashed passwords from the hard drive when it was connected to another device. Which of the following security measures could have helped prevent this account from being compromised?

Show Suggested Answer Hide Answer
Suggested Answer: D

Full Disk Encryption ensures that the data on the laptop is encrypted at rest, preventing unauthorized access even if the device is stolen and its hard drive accessed externally. This aligns with CASP+ objective 3.5, which emphasizes implementing encryption to protect sensitive data against theft and compromise.


Contribute your Thoughts:

Virgie
28 days ago
I'm going with D) Full Disk Encryption. Encrypted hard drives are like digital Fort Knox - even if they get their hands on it, they ain't getting in!
upvoted 0 times
Venita
6 days ago
C) Host-based Firewall could have blocked the attacker from accessing the hashed passwords.
upvoted 0 times
...
Chu
8 days ago
B) Endpoint Detection and Response could have detected the suspicious activity on the stolen laptop.
upvoted 0 times
...
Cherelle
14 days ago
A) Host-based Intrusion Detection could have alerted us to the unauthorized access.
upvoted 0 times
...
...
Maile
1 months ago
Ha, the attacker thought they were so smart, but D) Full Disk Encryption would have ruined their day. Gotta love that extra layer of security!
upvoted 0 times
Sherly
6 days ago
Ha, the attacker thought they were so smart, but D) Full Disk Encryption would have ruined their day. Gotta love that extra layer of security!
upvoted 0 times
...
Letha
7 days ago
D) Full Disk Encryption
upvoted 0 times
...
Daniel
8 days ago
C) Host-based Firewall
upvoted 0 times
...
Lauran
9 days ago
B) Endpoint Detection and Response
upvoted 0 times
...
Jamey
10 days ago
A) Host-based Intrusion Detection System
upvoted 0 times
...
...
Annalee
2 months ago
Wow, that's a tough one. I'd say B) Endpoint Detection and Response could have helped detect the suspicious activity, but D) Full Disk Encryption is the real MVP here.
upvoted 0 times
Elli
25 days ago
That's true, Endpoint Detection and Response could have alerted the user to the suspicious activity before it escalated.
upvoted 0 times
...
Dyan
29 days ago
But wouldn't B) Endpoint Detection and Response have helped to detect the breach sooner?
upvoted 0 times
...
Keith
1 months ago
Yeah, Full Disk Encryption would have made it much harder for the attacker to access the hashed passwords.
upvoted 0 times
...
Deeanna
1 months ago
I think D) Full Disk Encryption would have been the best defense in this situation.
upvoted 0 times
...
...
Pauline
2 months ago
D) Full Disk Encryption is definitely the way to go. Gotta protect that data even if the laptop gets stolen!
upvoted 0 times
Rana
17 days ago
D) Full Disk Encryption
upvoted 0 times
...
Stefania
20 days ago
C) Host-based Firewall
upvoted 0 times
...
Pamella
23 days ago
B) Endpoint Detection and Response
upvoted 0 times
...
Zack
24 days ago
A) Host-based Intrusion Detection System
upvoted 0 times
...
...
Portia
2 months ago
I believe A) Host-based Intrusion Detection System could also have helped detect the unauthorized access.
upvoted 0 times
...
Kenneth
2 months ago
I agree with Alline, Full Disk Encryption would have protected the hashed passwords on the stolen laptop.
upvoted 0 times
...
Alline
2 months ago
I think D) Full Disk Encryption could have prevented this breach.
upvoted 0 times
...

Save Cancel