exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 79 discussion

Actual exam question from CompTIA's CS0-002
Question #: 79
Topic #: 1
[All CS0-002 Questions]

A business recently acquired a software company. The software company's security posture is unknown. However, based on an initial assessment, there are limited security controls. No significant security monitoring exists. Which of the following is the NEXT step that should be completed to obtain information about the software company's security posture?

  • A. Develop an asset inventory to determine the systems within the software company.
  • B. Review relevant network drawings, diagrams, and documentation.
  • C. Perform penetration tests against the software company's internal and external networks.
  • D. Baseline the software company's network to determine the ports and protocols in use.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
catastrophie
Highly Voted 2 years, 4 months ago
Why in the world would you just jump straight into a pentest? Some of you really just want to throw a black hoodie on and sit in a dark room and look cool. What are you looking for in your pentest? Whats your scope? You just gonna test everything in the entire company? An initial assessment was done and found the company was lacking security controls. You already know the posture is bad, there is no reason to test anything further at this point. At this point you need to start with a BIA and determine your critical assets that need the protection. A complete inventory must be completed. You do this to firstly ensure you know critical assets but another reason is to ensure you're not spending more money on the protection of an asset than its worth. Once you complete A, then you move to B, review this and it with the outcome from the BIA you can move to D and decide what ports and protocols are needed. Finally you can do the pentest, at this point you'll know the scope of the test and what you need to ensure is properly secured.
upvoted 28 times
Joshey
2 years, 2 months ago
The question says an initial assessment has already been done though
upvoted 1 times
...
AC6280
2 years, 3 months ago
Just wanted to strongly echo this sentiment because this is very important. Guys, if you have ever seen or performed a pentest, you know that it can knock over services in production. I've seen it and had to fix it numerous times. So what you're saying when you pick C is "Hey, let's immediately go super invasive and possibly disrupt production even though we have zero idea what normal even is." Pump the brakes and due the homework first. It's not sexy, but security rarely is.
upvoted 5 times
...
...
TheSkyMan
Highly Voted 2 years, 8 months ago
Here are my thoughts: A - this is asset management and won't help with determining a companies security posture. B - a good thing to do, but won't reveal the security information needed for this scenario. C - the only answer that could provide needed security information. D - this sounds good, but performing a new baseline while an unknown security breach is occurring would be useless. Should verify the security posture, fix any issues/vulnerabilities, than perform a new baseline.
upvoted 7 times
uday1985
1 year, 9 months ago
YOu cannot perform a pentest while you don't know whats in your environment!
upvoted 2 times
...
PTcruiser
2 years, 8 months ago
I dont think C is the answer because it says NEXT in bold meaning you cant just skip straight to the pentest if you dont even know how the network is mapped out. You also have to know whats in scope for a pentest so you wont break a legacy system or violate any agreements if one of your servers are from a MSP, it would be out of scope so you need to map out your network first. Im stuck between A & B but im going with B
upvoted 6 times
Mr_BuCk3th34D
2 years, 5 months ago
I totally agree with you, it seems more logic to review network topology > asset inventory to only afterwards perform pentest, that's the last thing you'll do in order to check a company's security posture.
upvoted 2 times
...
...
AaronS1990
2 years, 3 months ago
TheSkyMan how on earth do you figure that knowing what assets you have WON'T help you determine the security posture? Sorry but that's a baffling statement
upvoted 4 times
...
...
skibby16
Most Recent 1 year, 6 months ago
Selected Answer: B
I say this because the next step to obtain information about the software company's security posture is to review relevant network drawings, diagrams, and documentation. This step helps in understanding the existing network architecture, identifying critical assets, and assessing the overall network design. By reviewing documentation, you can gather insights into the network topology, the placement of security controls, and potentially identify areas of concern. This step is essential for building an initial understanding of the environment before diving into more invasive activities like penetration testing. Developing an asset inventory (Option A) is also crucial, but reviewing network drawings and documentation should precede it. Option C (performing penetration tests) may be premature without a clear understanding of the network, and Option D (baselining the network) can come later in the process after initial documentation review and asset identification.
upvoted 1 times
...
Gwatto
1 year, 7 months ago
"After initial assessment" Why would your NEXT step be to do do inventory assessment to see what systems the company has? How did you know security controls are weak, there must have been an assessment of the current systems
upvoted 1 times
...
Aliyan
1 year, 9 months ago
Selected Answer: B
Question says "Obtaining information about the software company's security posture" which refers to the process of assessing and understanding the current state of the software company's security measures, practices, and controls. It involves gathering insights into how well the company is protecting its information, systems, and assets from potential threats, vulnerabilities, and attacks. So A is wrong because its purpose is to form the basis for future security assessments and controls. (they are not asking to build a secure architecture and prepare and write down all the assets. they simply ask identify what this company has right now) where B will help identify existing security controls, even if limited. (plain and simple) you can see whats segmented, is there a firewall in between servers, is there a VPN server and much more. I know the question also say "based on an initial assessment" but this initial assessment may have involved a cursory review, observation, or examination of the company's security practices, systems, or controls and not the network topology
upvoted 1 times
...
naleenh
1 year, 10 months ago
Selected Answer: B
Even though the network drawings, diagrams, and documentation are not accurate. Better review the available details. I think immediate next step would be to Review relevant network drawings, diagrams, and documentation.
upvoted 1 times
...
josephconer1
2 years, 2 months ago
without knowing your ASSETS , you cannot have a baseline, and without a baseline you cannot have security in general. Start with the basics first especially since you don't know much about the software company. "Initial assessment" is too vague to not go with A. That's my thought at least.
upvoted 2 times
...
tatianna
2 years, 2 months ago
Developing an asset inventory to determine the systems within the software company would be a logical next step to obtain information about the software company's security posture. This would provide a baseline of the company's hardware and software assets, allowing for a better understanding of the scope of the security environment and the potential attack surface. From there, more targeted assessments and testing could be conducted to identify vulnerabilities and improve the security posture.
upvoted 1 times
...
2Fish
2 years, 2 months ago
Selected Answer: A
A. This is if Initial assessment = reviewing diagrams, drawings, docs, etc. You absolutely must have asset inventory before you can scope a pentest.
upvoted 2 times
...
encxorblood
2 years, 3 months ago
Selected Answer: A
Answer A - Performing penetration tests against the software company's internal and external networks (option C) is a more aggressive and invasive approach to understanding the security posture of the software company, and should only be done after other less invasive measures have been taken.
upvoted 3 times
...
absabs
2 years, 3 months ago
Selected Answer: A
When perform pentest before have not information about asset is not logical for me. i going with A.
upvoted 3 times
...
AaronS1990
2 years, 3 months ago
Selected Answer: A
Has to be A. You aren't going to be able to perform an effective pentest until you know what the system is
upvoted 2 times
...
CatoFong
2 years, 3 months ago
Selected Answer: A
Agreeing with the A.'s
upvoted 2 times
...
moonash
2 years, 4 months ago
Selected Answer: A
I would go with A. What would I be pentesting if I don't know the assets. First I need to know what I have i.e. we have cisco switches, fortigate firewall, XYZ servers runing on XYZ etc.. then I scan/ pentest the assets.. I can't use pentest to know what I have in the organization. I am going with A all the way
upvoted 3 times
...
trainingsmits
2 years, 4 months ago
Selected Answer: A
They need to establish all of their assets to know what to protect/what is most valuable. A is the first step to take.
upvoted 3 times
...
f3lix
2 years, 5 months ago
Selected Answer: A
Guys, C is the correct answer, the question is "what is the NEXT step that should be completed to OBTAIN INFORMATION ABOUT the software company's security posture", - You'll have to obtain an asset inventory to determine the systems within the software company, since its a newly acquired business - A!
upvoted 1 times
f3lix
2 years, 5 months ago
Damn! I mean A is the correct answer**
upvoted 3 times
...
...
roman1000
2 years, 5 months ago
Selected Answer: A
What are you going to pen test if you don't know your asset?
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...