A company has a primary control in place to restrict access to a sensitive database. However, the company discovered an authentication vulnerability that could bypass this control. Which of the following is the best compensating control?
A.
Running regular penetration tests to identify and address new vulnerabilities.
B.
Conducting regular security awareness training of employees to prevent social engineering attacks.
C.
Deploying an additional layer of access controls to verify authorized individuals.
D.
Implementing intrusion detection software to alert security teams of unauthorized access attempts
C. Deploying an additional layer of access controls to verify authorized individuals: This directly addresses the authentication vulnerability by adding another layer of security. Examples include multi-factor authentication (MFA), additional identity verification steps, or implementing more stringent access control mechanisms. This would help ensure that even if the primary authentication mechanism is bypassed, the additional layer would prevent unauthorized access.
C. Deploying an additional layer of access controls to verify authorized individuals.
This approach directly addresses the authentication vulnerability by adding an extra layer of security, ensuring that only authorized individuals can access the sensitive database, even if the primary control is bypassed.
access controls MFA. directly mitigates the risk posed by the authentication vulnerability. It ensures that even if the primary authentication mechanism is compromised, unauthorized access is still prevented by requiring an additional verification step.
Option C (Deploying an additional layer of access controls to verify authorized individuals) directly addresses the identified authentication vulnerability. By adding an extra layer of access controls, such as multi-factor authentication (MFA) or stronger authentication mechanisms, the company can mitigate the risk of unauthorized access due to the authentication bypass vulnerability. This compensating control strengthens the security posture by requiring additional verification steps for individuals attempting to access the sensitive database, thereby reducing the impact of the discovered vulnerability.
This section is not available anymore. Please use the main Exam Page.CS0-003 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Chiniwini
Highly Voted 9 months, 2 weeks agoOmo_Mushin
Most Recent 9 months, 2 weeks agomaggie22
9 months, 3 weeks agoTodd69420
9 months, 4 weeks agoMataria
10 months, 2 weeks agoMataria
8 months, 3 weeks ago