exam questions

Exam 350-201 All Questions

View all questions & answers for the 350-201 exam

Exam 350-201 topic 1 question 14 discussion

Actual exam question from Cisco's 350-201
Question #: 14
Topic #: 1
[All 350-201 Questions]

A company recently completed an internal audit and discovered that there is CSRF vulnerability in 20 of its hosted applications. Based on the audit, which recommendation should an engineer make for patching?

  • A. Identify the business applications running on the assets
  • B. Update software to patch third-party software
  • C. Validate CSRF by executing exploits within Metasploit
  • D. Fix applications according to the risk scores
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
marceus
2 months, 3 weeks ago
Selected Answer: D
ChatGPT: The most effective approach is to fix applications based on their risk scores. This ensures that the most critical vulnerabilities, which could lead to serious security breaches, are addressed first, reducing overall risk to the organization.
upvoted 1 times
...
TrainingTeam
6 months, 2 weeks ago
Selected Answer: D
When dealing with a CSRF vulnerability discovered in multiple applications, the recommended approach is to prioritize patching based on the risk scores associated with each application. This ensures that the most critical vulnerabilities that pose the greatest risk to the organization are addressed first. It is a strategic approach that aligns remediation efforts with the potential impact of the vulnerabilities4.
upvoted 1 times
...
DrVoIP
2 years, 2 months ago
D. Fix applications according to the risk scores. In order to prioritize the patching process, the engineer should prioritize applications based on their risk scores. Risk scoring allows for a systematic evaluation of the level of risk associated with the applications and assists in determining the order of priority for addressing the vulnerabilities. This ensures that the most critical applications are patched first, thereby mitigating the risk of a successful attack. Identifying the business applications running on the assets (Option A) is an important step, but it does not directly address the issue of patching the CSRF vulnerability. Updating software to patch third-party software (Option B) is also important, but may not be the most critical step at this time. Validating CSRF by executing exploits In order to prioritize the patching process, the engineer should prioritize applications based on their risk scores. within Metasploit (Option C) is not necessary as the vulnerability has already been identified.
upvoted 2 times
...
TOLU1985
2 years, 7 months ago
Selected Answer: D
Cross-Site Request Forgery (CSRF) is a type of attack that occurs when a malicious web site, email, blog, instant message, or program causes a user's web browser to perform an unwanted action on a trusted site when the user is authenticated. A CSRF attack works because browser requests automatically include all cookies including session cookies. Therefore, if the user is authenticated to the site, the site cannot distinguish between legitimate authorized requests and forged authenticated requests. https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html D fit here, any concerns?
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago