exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 82 discussion

Actual exam question from ISC's CISSP
Question #: 82
Topic #: 1
[All CISSP Questions]

Which of the following threats would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities?

  • A. Distributed denial-of-service (DDoS) attack
  • B. Advanced persistent threat (APT) attempt
  • C. Zero-day attack
  • D. Phishing attempt
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CuteRabbit168
Highly Voted 2 years, 9 months ago
Selected Answer: B
Unlikely able to detect and mitigate zero-day attacks. Libraries may contain scripts that APTs can use to perform malicious activities
upvoted 17 times
jackdryan
2 years, 1 month ago
B is correct
upvoted 4 times
...
...
irEd1
Highly Voted 2 years, 5 months ago
C. Zero day attacks. A zero day attack means the vulnerability was present from day 0. The only thing that would prevent it is constantly checking your open source libraries to see if there are updates because of a vulnerability. Same as patches and updates.
upvoted 11 times
Ramye
1 year ago
Wrong definition. Zero Day attack means - any vulnerabilities / threat which is unknown and does not have any solution at this time. So you don’t know you most likely monitor for known issues.
upvoted 4 times
...
...
djedwards
Most Recent 3 weeks, 5 days ago
Selected Answer: C
Most other sites agree with C
upvoted 1 times
...
36dd0ae
1 month, 2 weeks ago
Selected Answer: C
C: Zero-day attack A zero-day attack exploits a previously unknown or unpatched vulnerability in software (heartbleed/log4j) - often found in open source libraries that are integrated into apps.
upvoted 1 times
...
fuzzyguzzy
2 months, 2 weeks ago
Selected Answer: C
All these answers are terrible, but zero day attacks exploit vulnerabilities that would show up in a decent threat feed. APTs exploit vulnerabilities, but they require more than just handling and scanning for vulnerabilities.
upvoted 1 times
...
BigITGuy
3 months ago
Selected Answer: C
Monitoring assets containing open source libraries for vulnerabilities is most effective against the risk of zero-day attacks or emerging vulnerabilities.
upvoted 1 times
...
iRyae
4 months, 2 weeks ago
Selected Answer: C
A zero-day attack targets previously unknown vulnerabilities in software or systems that the vendor has not yet patched or disclosed. Many open-source libraries and components are widely used across various applications, and they may contain undiscovered vulnerabilities. Monitoring these assets for vulnerabilities, especially in open-source libraries, helps identify and patch these security flaws before they are exploited by attackers in zero-day attacks. APTs are sophisticated, long-term attacks. While they might leverage a vulnerability in an open-source library, they are more complex and often involve multiple attack vectors. Monitoring libraries is a helpful part of a broader defense against APTs, but it's not the primary mitigation strategy.
upvoted 1 times
...
easyp
5 months ago
Selected Answer: C
The correct answer is: C. Zero-day attack Explanation: Monitoring assets that contain open-source libraries for vulnerabilities is most likely to mitigate the risk of a zero-day attack, particularly in scenarios where an attacker exploits vulnerabilities in outdated or poorly maintained open-source libraries. By regularly monitoring these libraries: Organizations can identify vulnerabilities as they are discovered. They can apply patches or updates promptly, reducing the likelihood of a zero-day vulnerability being exploited. Open-source libraries are commonly used in modern applications, and vulnerabilities in these libraries can be targeted by attackers in zero-day scenarios.
upvoted 1 times
...
Fouad777
6 months, 1 week ago
Selected Answer: C
Zero-day attacks exploit vulnerabilities that are unknown to the software vendor and for which no patch is available. Open-source libraries, being widely used, are often targets for zero-day exploits. Monitoring these libraries for newly discovered vulnerabilities allows organizations to proactively mitigate the risk of zero-day attacks by: Quickly identifying when a vulnerability is disclosed. Applying patches or workarounds as soon as they become available. Potentially implementing mitigations even before an official patch is released if details of the vulnerability are known.
upvoted 1 times
...
Ravnit
6 months, 2 weeks ago
Selected Answer: C
Zero-day attacks exploit unknown or unpatched vulnerabilities in software. By monitoring and regularly updating open source libraries for known vulnerabilities, organizations can reduce the risk of zero-day exploits, ensuring that any discovered vulnerabilities are promptly addressed before they can be exploited by attackers.
upvoted 2 times
...
aaminenaji
8 months, 2 weeks ago
I would go with C and here is why: monitoring libraries won’t typically prevent the full spectrum of an APT, which includes social engineering, lateral movement, and other methods beyond just exploiting software vulnerabilities.
upvoted 2 times
...
deeden
10 months, 4 weeks ago
Selected Answer: C
Monitoring assets containing open source libraries for vulnerabilities is most effective in mitigating zero-day attacks. Zero-day attacks exploit vulnerabilities that are unknown to the software vendor and for which no patch exists. By tracking open-source libraries and their associated vulnerabilities, organizations can identify and address potential risks before they are exploited. The other options are less likely to be directly impacted by monitoring open source libraries: DDoS attacks target network availability, not specific vulnerabilities. APTs are persistent threats that may or may not involve exploiting software vulnerabilities. While monitoring open source libraries won't prevent all zero-day attacks, it significantly reduces the risk of exploitation.
upvoted 1 times
...
CCNPWILL
1 year ago
Selected Answer: B
B is the best answer out of all choices.
upvoted 1 times
...
Ramye
1 year, 1 month ago
A Zero Day means exploiting those vulnerabilities for what there are no solutions yet. And these could be that it was not discovered and known to vendors yet. So you can’t take action for threats that are unknown, so the answer most likely is B. But anyone has confirmed answer pls confirm. Thx
upvoted 2 times
...
Jenkins3mol
1 year, 1 month ago
Selected Answer: A
You are never going to beat 0day or apt. Come on.
upvoted 1 times
...
Jenkins3mol
1 year, 2 months ago
Selected Answer: C
Well, I think you will never be able to mitigate apt risk, because they've got to get you. It's just a question of time. And APT does possessed and developed lots of Zero-day vulnerabilities as well.
upvoted 2 times
...
CCNPWILL
1 year, 2 months ago
Selected Answer: C
I agree with C as well.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...