Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 82 discussion

Actual exam question from ISC's CISSP
Question #: 82
Topic #: 1
[All CISSP Questions]

Which of the following threats would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities?

  • A. Distributed denial-of-service (DDoS) attack
  • B. Advanced persistent threat (APT) attempt
  • C. Zero-day attack
  • D. Phishing attempt
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
CuteRabbit168
Highly Voted 2 years, 2 months ago
Selected Answer: B
Unlikely able to detect and mitigate zero-day attacks. Libraries may contain scripts that APTs can use to perform malicious activities
upvoted 11 times
jackdryan
1 year, 6 months ago
B is correct
upvoted 4 times
...
...
irEd1
Highly Voted 1 year, 10 months ago
C. Zero day attacks. A zero day attack means the vulnerability was present from day 0. The only thing that would prevent it is constantly checking your open source libraries to see if there are updates because of a vulnerability. Same as patches and updates.
upvoted 10 times
Ramye
5 months ago
Wrong definition. Zero Day attack means - any vulnerabilities / threat which is unknown and does not have any solution at this time. So you don’t know you most likely monitor for known issues.
upvoted 1 times
...
...
aaminenaji
Most Recent 1 month, 1 week ago
I would go with C and here is why: monitoring libraries won’t typically prevent the full spectrum of an APT, which includes social engineering, lateral movement, and other methods beyond just exploiting software vulnerabilities.
upvoted 1 times
...
deeden
3 months, 2 weeks ago
Selected Answer: C
Monitoring assets containing open source libraries for vulnerabilities is most effective in mitigating zero-day attacks. Zero-day attacks exploit vulnerabilities that are unknown to the software vendor and for which no patch exists. By tracking open-source libraries and their associated vulnerabilities, organizations can identify and address potential risks before they are exploited. The other options are less likely to be directly impacted by monitoring open source libraries: DDoS attacks target network availability, not specific vulnerabilities. APTs are persistent threats that may or may not involve exploiting software vulnerabilities. While monitoring open source libraries won't prevent all zero-day attacks, it significantly reduces the risk of exploitation.
upvoted 1 times
...
CCNPWILL
5 months, 3 weeks ago
Selected Answer: B
B is the best answer out of all choices.
upvoted 1 times
...
Ramye
6 months, 1 week ago
A Zero Day means exploiting those vulnerabilities for what there are no solutions yet. And these could be that it was not discovered and known to vendors yet. So you can’t take action for threats that are unknown, so the answer most likely is B. But anyone has confirmed answer pls confirm. Thx
upvoted 1 times
...
Jenkins3mol
6 months, 3 weeks ago
Selected Answer: A
You are never going to beat 0day or apt. Come on.
upvoted 1 times
...
Jenkins3mol
6 months, 3 weeks ago
Selected Answer: C
Well, I think you will never be able to mitigate apt risk, because they've got to get you. It's just a question of time. And APT does possessed and developed lots of Zero-day vulnerabilities as well.
upvoted 1 times
...
CCNPWILL
7 months, 1 week ago
Selected Answer: C
I agree with C as well.
upvoted 1 times
...
dm808
8 months ago
Selected Answer: C
The answer is C. As stated earlier by thanhlb, C includes B.. or part of B.. APTs use zero days.. but also employ Social Engineering, which wouldn't be covered in a vulnerability library
upvoted 1 times
...
Vasyamba1
8 months, 1 week ago
Selected Answer: B
From the v.9th OSG - One of the key differences between APT attackers and other malware authors is that these malware developers often have access to zero-day exploits that are not known to software vendors. So, B includes C
upvoted 1 times
...
Hongjun
8 months, 3 weeks ago
Selected Answer: B
Zero day attacks means nobody know this weak point at current time. So even you check the code you still don't know . But you can improve your code to prevent the knowed APT attacks.
upvoted 1 times
...
lexvather
9 months ago
is Zero Days, the most likely in open source is Zero Day attacks, instead the APTs, can compromise a organization no just by monitoring the assets with open source, the TTPs used by APTs can process more than assets in open source.
upvoted 1 times
...
IntheZone
10 months, 1 week ago
Reading how many people say Zero Attack makes me not want to open the comment section ever again!!
upvoted 2 times
Ramye
6 months, 1 week ago
Okay you’re pissed but what’s your answer and explanation? Explain so it helps others….
upvoted 1 times
...
...
thanhlb
1 year ago
Selected Answer: C
C include B
upvoted 2 times
...
BoZT
1 year, 3 months ago
Selected Answer: C
Most likely is C, in the real world
upvoted 1 times
...
Bach1968
1 year, 4 months ago
Selected Answer: C
The threat that would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities is option C: Zero-day attack. A zero-day attack refers to an attack that exploits a previously unknown vulnerability in software before the software vendor has had a chance to patch or fix it. These vulnerabilities can exist in open source libraries that are commonly used in various applications and systems. By monitoring assets containing open source libraries for vulnerabilities, organizations can stay informed about any newly discovered vulnerabilities or weaknesses in these libraries. This allows them to take proactive measures, such as applying patches or updates, implementing workarounds, or finding alternative solutions, to mitigate the risk of zero-day attacks. While monitoring assets for open source vulnerabilities can contribute to overall security and help mitigate other threats as well, such as B (APT attempts) or D (phishing attempts), it is particularly relevant in addressing the risks associated with zero-day attacks.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...