Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CISSP topic 1 question 82 discussion

Actual exam question from ISC's CISSP
Question #: 82
Topic #: 1
[All CISSP Questions]

Which of the following threats would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities?

  • A. Distributed denial-of-service (DDoS) attack
  • B. Advanced persistent threat (APT) attempt
  • C. Zero-day attack
  • D. Phishing attempt
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
irEd1
Highly Voted 1 year, 3 months ago
C. Zero day attacks. A zero day attack means the vulnerability was present from day 0. The only thing that would prevent it is constantly checking your open source libraries to see if there are updates because of a vulnerability. Same as patches and updates.
upvoted 10 times
...
CuteRabbit168
Highly Voted 1 year, 7 months ago
Selected Answer: B
Unlikely able to detect and mitigate zero-day attacks. Libraries may contain scripts that APTs can use to perform malicious activities
upvoted 9 times
jackdryan
11 months, 4 weeks ago
B is correct
upvoted 3 times
...
...
Jenkins3mol
Most Recent 2 days, 5 hours ago
Selected Answer: C
Well, I think you will never be able to mitigate apt risk, because they've got to get you. It's just a question of time. And APT does possessed and developed lots of Zero-day vulnerabilities as well.
upvoted 1 times
...
CCNPWILL
2 weeks, 1 day ago
Selected Answer: C
I agree with C as well.
upvoted 1 times
...
dm808
1 month ago
Selected Answer: C
The answer is C. As stated earlier by thanhlb, C includes B.. or part of B.. APTs use zero days.. but also employ Social Engineering, which wouldn't be covered in a vulnerability library
upvoted 1 times
...
Vasyamba1
1 month, 1 week ago
Selected Answer: B
From the v.9th OSG - One of the key differences between APT attackers and other malware authors is that these malware developers often have access to zero-day exploits that are not known to software vendors. So, B includes C
upvoted 1 times
...
Hongjun
2 months ago
Selected Answer: B
Zero day attacks means nobody know this weak point at current time. So even you check the code you still don't know . But you can improve your code to prevent the knowed APT attacks.
upvoted 1 times
...
lexvather
2 months, 1 week ago
is Zero Days, the most likely in open source is Zero Day attacks, instead the APTs, can compromise a organization no just by monitoring the assets with open source, the TTPs used by APTs can process more than assets in open source.
upvoted 1 times
...
IntheZone
3 months, 2 weeks ago
Reading how many people say Zero Attack makes me not want to open the comment section ever again!!
upvoted 2 times
...
thanhlb
6 months ago
Selected Answer: C
C include B
upvoted 2 times
...
BoZT
8 months, 2 weeks ago
Selected Answer: C
Most likely is C, in the real world
upvoted 1 times
...
Bach1968
10 months ago
Selected Answer: C
The threat that would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities is option C: Zero-day attack. A zero-day attack refers to an attack that exploits a previously unknown vulnerability in software before the software vendor has had a chance to patch or fix it. These vulnerabilities can exist in open source libraries that are commonly used in various applications and systems. By monitoring assets containing open source libraries for vulnerabilities, organizations can stay informed about any newly discovered vulnerabilities or weaknesses in these libraries. This allows them to take proactive measures, such as applying patches or updates, implementing workarounds, or finding alternative solutions, to mitigate the risk of zero-day attacks. While monitoring assets for open source vulnerabilities can contribute to overall security and help mitigate other threats as well, such as B (APT attempts) or D (phishing attempts), it is particularly relevant in addressing the risks associated with zero-day attacks.
upvoted 2 times
...
HughJassole
10 months, 2 weeks ago
C: Zero day attack. "Software often has security vulnerabilities that hackers can exploit" https://usa.kaspersky.com/resource-center/definitions/zero-day-exploit It isn't B because APT is not about a vulnerability in the software, it's an overall attack strategy: https://www.imperva.com/learn/application-security/apt-advanced-persistent-threat/
upvoted 1 times
...
Yokota
10 months, 3 weeks ago
Selected Answer: C
Open source libraries are widely used in software development, and they can contain vulnerabilities that are discovered over time. Monitoring these assets for vulnerabilities involves staying updated on the latest security advisories, patches, and fixes related to the open source libraries in use. By actively monitoring open source libraries for vulnerabilities, organizations can identify and address security issues promptly. This reduces the risk of attackers exploiting previously unknown vulnerabilities (zero-day vulnerabilities) present in the open source libraries.
upvoted 1 times
...
crazywai1221
1 year ago
Selected Answer: C
The threat that would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities is C. Zero-day attack. Zero-day attacks exploit vulnerabilities that are unknown to the public, and monitoring for vulnerabilities in open source libraries can help identify and address these vulnerabilities before they can be exploited.
upvoted 1 times
...
FredDurst
1 year ago
Selected Answer: C
By monitoring assets containing open source libraries for vulnerabilities, organizations can identify and patch vulnerabilities before attackers can exploit them. This is particularly important for zero-day attacks since there is no known defense against them until the vulnerability is discovered and patched.
upvoted 2 times
...
Dee83
1 year, 3 months ago
B. Advanced persistent threat (APT) attempt Monitoring assets containing open source libraries for vulnerabilities can be used as a mitigation strategy against Advanced persistent threat (APT) attempts. APTs are a type of cyber attack in which an attacker establishes an unauthorized, long-term presence on a network in order to steal sensitive information. By monitoring assets containing open source libraries for vulnerabilities, an organization can identify and patch vulnerabilities that could be exploited by APT attackers, which will make it more difficult for them to gain unauthorized access to the network. It is worth noting that monitoring assets containing open source libraries for vulnerabilities is one of the many strategies that can be used to mitigate APT attempts, and it does not cover all types of threats such as DDoS, Zero-day attack, Phishing attempt.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...