A company recently completed an internal audit and discovered that there is CSRF vulnerability in 20 of its hosted applications. Based on the audit, which recommendation should an engineer make for patching?
A.
Identify the business applications running on the assets
B.
Update software to patch third-party software
C.
Validate CSRF by executing exploits within Metasploit
ChatGPT: The most effective approach is to fix applications based on their risk scores. This ensures that the most critical vulnerabilities, which could lead to serious security breaches, are addressed first, reducing overall risk to the organization.
When dealing with a CSRF vulnerability discovered in multiple applications, the recommended approach is to prioritize patching based on the risk scores associated with each application. This ensures that the most critical vulnerabilities that pose the greatest risk to the organization are addressed first. It is a strategic approach that aligns remediation efforts with the potential impact of the vulnerabilities4.
D. Fix applications according to the risk scores.
In order to prioritize the patching process, the engineer should prioritize applications based on their risk scores. Risk scoring allows for a systematic evaluation of the level of risk associated with the applications and assists in determining the order of priority for addressing the vulnerabilities. This ensures that the most critical applications are patched first, thereby mitigating the risk of a successful attack.
Identifying the business applications running on the assets (Option A) is an important step, but it does not directly address the issue of patching the CSRF vulnerability. Updating software to patch third-party software (Option B) is also important, but may not be the most critical step at this time. Validating CSRF by executing exploits In order to prioritize the patching process, the engineer should prioritize applications based on their risk scores. within Metasploit (Option C) is not necessary as the vulnerability has already been identified.
Cross-Site Request Forgery (CSRF) is a type of attack that occurs when a malicious web site, email, blog, instant message, or program causes a user's web browser to perform an unwanted action on a trusted site when the user is authenticated. A CSRF attack works because browser requests automatically include all cookies including session cookies. Therefore, if the user is authenticated to the site, the site cannot distinguish between legitimate authorized requests and forged authenticated requests.
https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
D fit here, any concerns?
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.350-201 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
marceus
2 months, 3 weeks agoTrainingTeam
6 months, 2 weeks agoDrVoIP
2 years, 2 months agoTOLU1985
2 years, 7 months ago