CompTIA CAS-003: Configuration of Collaboration Tools to Meet New Security Requirements

Which Applications Must Be Configured to Meet New Requirements?

Question

Within the past six months, a company has experienced a series of attacks directed at various collaboration tools.

Additionally, sensitive information was compromised during a recent security breach of a remote access session from an unsecure site.

As a result, the company is requiring all collaboration tools to comply with the following: -> Secure messaging between internal users using digital signatures -> Secure sites for video-conferencing sessions -> Presence information for all office employees -> Restriction of certain types of messages to be allowed into the network.

Which of the following applications must be configured to meet the new requirements? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E. F.

AD.

Based on the requirements mentioned in the scenario, the following applications must be configured to meet the new requirements:

  1. Secure messaging between internal users using digital signatures: This requirement implies that the company wants to ensure that messages sent between internal users are secure and have not been tampered with during transmission. To meet this requirement, an application that supports digital signatures must be used. Email and instant messaging are two common applications that support digital signatures. Therefore, options D and E (email and instant messaging) could be possible choices.

  2. Secure sites for video-conferencing sessions: This requirement implies that the company wants to ensure that video conferencing sessions are conducted in a secure manner. To meet this requirement, an application that supports secure sites for video conferencing must be used. VoIP and social media websites do not provide secure sites for video conferencing, so they can be eliminated as choices. Remote desktop and remote assistance are not related to video conferencing, so they can also be eliminated. Therefore, option E (instant messaging) can be eliminated, and option B (VoIP) could be a possible choice.

  3. Presence information for all office employees: This requirement implies that the company wants to be able to track the presence of all office employees. Presence information is typically provided by instant messaging applications. Therefore, option E (instant messaging) could be a possible choice.

  4. Restriction of certain types of messages to be allowed into the network: This requirement implies that the company wants to restrict certain types of messages from being allowed into the network. Email and instant messaging applications typically provide the ability to restrict certain types of messages. Therefore, options D and E (email and instant messaging) could be possible choices.

Based on the above analysis, options B (VoIP) and either D or E (email or instant messaging) are the two applications that must be configured to meet the new requirements.