Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.
C. Zero day attacks. A zero day attack means the vulnerability was present from day 0. The only thing that would prevent it is constantly checking your open source libraries to see if there are updates because of a vulnerability. Same as patches and updates.
Well, I think you will never be able to mitigate apt risk, because they've got to get you. It's just a question of time. And APT does possessed and developed lots of Zero-day vulnerabilities as well.
The answer is C.
As stated earlier by thanhlb, C includes B.. or part of B..
APTs use zero days.. but also employ Social Engineering, which wouldn't be covered in a vulnerability library
From the v.9th OSG - One of the key differences between APT attackers and other malware authors is that these malware developers often have access to zero-day exploits that are not known to software vendors.
So, B includes C
Zero day attacks means nobody know this weak point at current time. So even you check the code you still don't know . But you can improve your code to prevent the knowed APT attacks.
is Zero Days, the most likely in open source is Zero Day attacks, instead the APTs, can compromise a organization no just by monitoring the assets with open source, the TTPs used by APTs can process more than assets in open source.
The threat that would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities is option C: Zero-day attack.
A zero-day attack refers to an attack that exploits a previously unknown vulnerability in software before the software vendor has had a chance to patch or fix it. These vulnerabilities can exist in open source libraries that are commonly used in various applications and systems.
By monitoring assets containing open source libraries for vulnerabilities, organizations can stay informed about any newly discovered vulnerabilities or weaknesses in these libraries. This allows them to take proactive measures, such as applying patches or updates, implementing workarounds, or finding alternative solutions, to mitigate the risk of zero-day attacks.
While monitoring assets for open source vulnerabilities can contribute to overall security and help mitigate other threats as well, such as B (APT attempts) or D (phishing attempts), it is particularly relevant in addressing the risks associated with zero-day attacks.
C: Zero day attack. "Software often has security vulnerabilities that hackers can exploit"
https://usa.kaspersky.com/resource-center/definitions/zero-day-exploit
It isn't B because APT is not about a vulnerability in the software, it's an overall attack strategy:
https://www.imperva.com/learn/application-security/apt-advanced-persistent-threat/
Open source libraries are widely used in software development, and they can contain vulnerabilities that are discovered over time. Monitoring these assets for vulnerabilities involves staying updated on the latest security advisories, patches, and fixes related to the open source libraries in use.
By actively monitoring open source libraries for vulnerabilities, organizations can identify and address security issues promptly. This reduces the risk of attackers exploiting previously unknown vulnerabilities (zero-day vulnerabilities) present in the open source libraries.
The threat that would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities is C. Zero-day attack. Zero-day attacks exploit vulnerabilities that are unknown to the public, and monitoring for vulnerabilities in open source libraries can help identify and address these vulnerabilities before they can be exploited.
By monitoring assets containing open source libraries for vulnerabilities, organizations can identify and patch vulnerabilities before attackers can exploit them. This is particularly important for zero-day attacks since there is no known defense against them until the vulnerability is discovered and patched.
B. Advanced persistent threat (APT) attempt
Monitoring assets containing open source libraries for vulnerabilities can be used as a mitigation strategy against Advanced persistent threat (APT) attempts. APTs are a type of cyber attack in which an attacker establishes an unauthorized, long-term presence on a network in order to steal sensitive information. By monitoring assets containing open source libraries for vulnerabilities, an organization can identify and patch vulnerabilities that could be exploited by APT attackers, which will make it more difficult for them to gain unauthorized access to the network.
It is worth noting that monitoring assets containing open source libraries for vulnerabilities is one of the many strategies that can be used to mitigate APT attempts, and it does not cover all types of threats such as DDoS, Zero-day attack, Phishing attempt.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
irEd1
Highly Voted 1 year, 3 months agoCuteRabbit168
Highly Voted 1 year, 7 months agojackdryan
11 months, 4 weeks agoJenkins3mol
Most Recent 2 days, 5 hours agoCCNPWILL
2 weeks, 1 day agodm808
1 month agoVasyamba1
1 month, 1 week agoHongjun
2 months agolexvather
2 months, 1 week agoIntheZone
3 months, 2 weeks agothanhlb
6 months agoBoZT
8 months, 2 weeks agoBach1968
10 months agoHughJassole
10 months, 2 weeks agoYokota
10 months, 3 weeks agocrazywai1221
1 year agoFredDurst
1 year agoDee83
1 year, 3 months ago