Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 379 discussion

Actual exam question from ISC's CISSP
Question #: 379
Topic #: 1
[All CISSP Questions]

A breach investigation found a website was exploited through an open source component. What is the FIRST step in the process that could have prevented this breach?

  • A. Application whitelisting
  • B. Vulnerability remediation
  • C. Web application firewall (WAF)
  • D. Software inventory
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Nickname53796
Highly Voted 2 years, 1 month ago
Selected Answer: D
You have to know you have something before you can mitigate the risk
upvoted 8 times
...
oudmaster
Highly Voted 1 year, 10 months ago
Confusing. B, C, and D seems all right answers. The question focus on the "first in the process", and seek "prevention". The issue is "vulnerability exploit". ! Option B will definitely prevent this if the vulnerability was patched. Option C is also a specialized solution to protect the web servers. Option D will help to discover the attack surfaces for this web server. I think this is the first in the process, but it is not a preventive solution.
upvoted 6 times
jackdryan
1 year, 6 months ago
B is correct
upvoted 1 times
...
JohnyDal
1 year, 9 months ago
Love your feedback! Yeah B seems to be the first preventive even before WAF for the relevant to the open source component.
upvoted 2 times
...
...
1460168
Most Recent 3 months, 3 weeks ago
Selected Answer: D
ChatGPT says: The FIRST step in the process that could have prevented the breach through an open source component is: D. Software inventory Maintaining an up-to-date software inventory is crucial for identifying all components and libraries used within applications, including open source components. This inventory allows organizations to track which components are in use, their versions, and their associated vulnerabilities. With a comprehensive software inventory, you can then apply appropriate measures to manage and secure these components effectively.
upvoted 1 times
...
gjimenezf
9 months, 4 weeks ago
Selected Answer: D
FIRST step is to get to know what software components are in use in your website (Inventory), then scan/research for vulnerabilities
upvoted 2 times
...
LVQ
10 months, 1 week ago
Selected Answer: B
If a software has an open source vulnerability a WAF will not be adequate protection against attacks such as SQL Injection.
upvoted 1 times
...
YesPlease
11 months ago
Selected Answer: C
Answer C) Web application firewall One of the most effective ways to prevent zero-day attacks is deploying a web application firewall (WAF) on the network edge. A WAF reviews all incoming traffic and filters out malicious inputs that might target security vulnerabilities.
upvoted 2 times
...
Soleandheel
11 months, 1 week ago
B. Vulnerability remediation. This step involves identifying and addressing known vulnerabilities in open source components, making it a more direct and proactive measure to prevent such breaches. It encompasses all the other answer choices.
upvoted 1 times
1460168
3 months, 3 weeks ago
B. Vulnerability remediation: While crucial for fixing known vulnerabilities, it comes after identifying which components are in use and which have vulnerabilities. Without a software inventory, you might not know which components need remediation.
upvoted 1 times
...
...
DASH_v
1 year, 6 months ago
D. The first step in the process preventing exploit the vuln. The logics: you need to know (identify) the vuln first before remediate or put a rule in WAF; in order to identify the vuln you need to security test, generally by vuln scanning the assets; to do a meaningful scanning you need to know what to scan - a.k.a. the software assets. Even though you don't scan the assets, or in a 0-day event, you need to know your assets before you can make a judgement on whether your (software)asset is vulnerable (that requires remediation or a new waf rule).
upvoted 2 times
...
Delab202
1 year, 7 months ago
Selected Answer: B
The first step in preventing a breach involving an open source component is to ensure that the component is up-to-date with the latest security patches. Therefore, the FIRST step in the process that could have prevented this breach is to regularly update and patch all software components, including open source components, used in the website to ensure that they are free of known vulnerabilities. This requires ongoing monitoring of security advisories and patches released by the developers of the open source component, as well as regular testing and verification to ensure that the updates do not introduce new vulnerabilities or break existing functionality. Additionally, it's essential to maintain an inventory of all software components and their dependencies, so any vulnerabilities are identified and addressed promptly.
upvoted 1 times
...
DJOEK
1 year, 10 months ago
Selected Answer: D
D. Software inventory is the first step that could have prevented this breach as it involves identifying and tracking all the software components and versions that are used in an organization, including those that are open-source. By keeping an inventory of all the software components, it becomes easier to identify when a vulnerability is present and take the necessary steps to patch or remove the vulnerable component before it can be exploited.
upvoted 1 times
...
Ivanchun
1 year, 11 months ago
Selected Answer: C
Web application firewall, from website open source component
upvoted 2 times
...
sec_007
2 years ago
Selected Answer: B
C Vulnerability scanning and remedial of OSS component should be the FIRST step that could have identified this in an early stage. WAF will protect against certain attacks like DDoS etc, will not offer a full proof solution to open-source vulnerabilities.
upvoted 2 times
sec_007
1 year, 11 months ago
I meant B
upvoted 2 times
...
...
franbarpro
2 years ago
Selected Answer: D
Think like a manager "What is the FIRST step" - "D"
upvoted 2 times
...
kptest12
2 years, 1 month ago
Answer C. Thought of D (software inventory which is also a good option, when we have zero day if there is proper inventory then we will know which server have the software installed) . But to prevent zero day WAF is the best option https://resources.infosecinstitute.com/topic/zero-day-attacks-protections-best-practices-and-how-to-implement-them/
upvoted 3 times
...
krassko
2 years, 1 month ago
Selected Answer: B
"Vulnerability management is an essential part of an organization's IT security strategy. Effective vulnerability management helps IT security teams ensure that critical issues are discovered, analysed, and remediated as fast and efficiently as possible." It's more generic, includes technical answer like WAF
upvoted 2 times
Rollizo
2 years, 1 month ago
the issue here is that can be a zero day attack and no path is available then you need a WAF always (prevention)
upvoted 2 times
Humongous1593
2 years, 1 month ago
What makes you think a WAF would stop a zero day either?
upvoted 3 times
...
...
...
kasiya
2 years, 2 months ago
Selected Answer: C
think about log4j
upvoted 4 times
...
Cww1
2 years, 2 months ago
Part of me thinks that ISC2 is going to be looking for D here
upvoted 3 times
GregP
2 years, 2 months ago
or maybe B?
upvoted 1 times
...
CuteRabbit168
2 years, 1 month ago
Agree with D. Select the "management/advisor" answer rather than the "technical" one.
upvoted 1 times
MrInfoSys
2 years ago
An inventory is not preventative. A firewall is...
upvoted 1 times
[Removed]
2 years ago
If the software inventory was adequately detailed, it should have referenced the open source components/dependencies used within the application... Both C and D are applicable, however I'm slightly leaning towards D, purely from a management perspective
upvoted 2 times
...
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...