exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 379 discussion

Actual exam question from ISC's CISSP
Question #: 379
Topic #: 1
[All CISSP Questions]

A breach investigation found a website was exploited through an open source component. What is the FIRST step in the process that could have prevented this breach?

  • A. Application whitelisting
  • B. Vulnerability remediation
  • C. Web application firewall (WAF)
  • D. Software inventory
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Nickname53796
Highly Voted 2 years, 4 months ago
Selected Answer: D
You have to know you have something before you can mitigate the risk
upvoted 9 times
...
oudmaster
Highly Voted 2 years, 1 month ago
Confusing. B, C, and D seems all right answers. The question focus on the "first in the process", and seek "prevention". The issue is "vulnerability exploit". ! Option B will definitely prevent this if the vulnerability was patched. Option C is also a specialized solution to protect the web servers. Option D will help to discover the attack surfaces for this web server. I think this is the first in the process, but it is not a preventive solution.
upvoted 7 times
jackdryan
1 year, 9 months ago
B is correct
upvoted 1 times
...
JohnyDal
2 years ago
Love your feedback! Yeah B seems to be the first preventive even before WAF for the relevant to the open source component.
upvoted 2 times
...
...
ayadmawla
Most Recent 3 weeks, 6 days ago
Selected Answer: D
The "First" step is to know what you have before being able to do something about it. D. Software inventory Explanation: The breach occurred due to an exploited open-source component. The FIRST step to prevent this is D. Software inventory, and here’s why: CISSP Domain Alignment: Domain 2 (Asset Security) and Domain 8 (Software Development Security) emphasize maintaining a software inventory to track all components (including open-source libraries). Without knowing what software is in use, vulnerabilities cannot be identified or managed.
upvoted 1 times
ayadmawla
3 weeks, 6 days ago
Why Software Inventory is the First Step: With an inventory, organizations can: Identify outdated or vulnerable components (via vulnerability scanning). Prioritize patching or replacement (vulnerability remediation, B). Without an inventory, vulnerabilities in open-source components remain unknown and unaddressed.
upvoted 1 times
...
...
1460168
6 months, 3 weeks ago
Selected Answer: D
ChatGPT says: The FIRST step in the process that could have prevented the breach through an open source component is: D. Software inventory Maintaining an up-to-date software inventory is crucial for identifying all components and libraries used within applications, including open source components. This inventory allows organizations to track which components are in use, their versions, and their associated vulnerabilities. With a comprehensive software inventory, you can then apply appropriate measures to manage and secure these components effectively.
upvoted 1 times
...
gjimenezf
1 year ago
Selected Answer: D
FIRST step is to get to know what software components are in use in your website (Inventory), then scan/research for vulnerabilities
upvoted 2 times
...
LVQ
1 year, 1 month ago
Selected Answer: B
If a software has an open source vulnerability a WAF will not be adequate protection against attacks such as SQL Injection.
upvoted 1 times
...
YesPlease
1 year, 2 months ago
Selected Answer: C
Answer C) Web application firewall One of the most effective ways to prevent zero-day attacks is deploying a web application firewall (WAF) on the network edge. A WAF reviews all incoming traffic and filters out malicious inputs that might target security vulnerabilities.
upvoted 2 times
...
Soleandheel
1 year, 2 months ago
B. Vulnerability remediation. This step involves identifying and addressing known vulnerabilities in open source components, making it a more direct and proactive measure to prevent such breaches. It encompasses all the other answer choices.
upvoted 1 times
1460168
6 months, 3 weeks ago
B. Vulnerability remediation: While crucial for fixing known vulnerabilities, it comes after identifying which components are in use and which have vulnerabilities. Without a software inventory, you might not know which components need remediation.
upvoted 1 times
...
...
DASH_v
1 year, 9 months ago
D. The first step in the process preventing exploit the vuln. The logics: you need to know (identify) the vuln first before remediate or put a rule in WAF; in order to identify the vuln you need to security test, generally by vuln scanning the assets; to do a meaningful scanning you need to know what to scan - a.k.a. the software assets. Even though you don't scan the assets, or in a 0-day event, you need to know your assets before you can make a judgement on whether your (software)asset is vulnerable (that requires remediation or a new waf rule).
upvoted 2 times
...
Delab202
1 year, 10 months ago
Selected Answer: B
The first step in preventing a breach involving an open source component is to ensure that the component is up-to-date with the latest security patches. Therefore, the FIRST step in the process that could have prevented this breach is to regularly update and patch all software components, including open source components, used in the website to ensure that they are free of known vulnerabilities. This requires ongoing monitoring of security advisories and patches released by the developers of the open source component, as well as regular testing and verification to ensure that the updates do not introduce new vulnerabilities or break existing functionality. Additionally, it's essential to maintain an inventory of all software components and their dependencies, so any vulnerabilities are identified and addressed promptly.
upvoted 1 times
...
DJOEK
2 years, 1 month ago
Selected Answer: D
D. Software inventory is the first step that could have prevented this breach as it involves identifying and tracking all the software components and versions that are used in an organization, including those that are open-source. By keeping an inventory of all the software components, it becomes easier to identify when a vulnerability is present and take the necessary steps to patch or remove the vulnerable component before it can be exploited.
upvoted 1 times
...
Ivanchun
2 years, 1 month ago
Selected Answer: C
Web application firewall, from website open source component
upvoted 2 times
...
sec_007
2 years, 3 months ago
Selected Answer: B
C Vulnerability scanning and remedial of OSS component should be the FIRST step that could have identified this in an early stage. WAF will protect against certain attacks like DDoS etc, will not offer a full proof solution to open-source vulnerabilities.
upvoted 2 times
sec_007
2 years, 2 months ago
I meant B
upvoted 2 times
...
...
franbarpro
2 years, 3 months ago
Selected Answer: D
Think like a manager "What is the FIRST step" - "D"
upvoted 2 times
...
kptest12
2 years, 4 months ago
Answer C. Thought of D (software inventory which is also a good option, when we have zero day if there is proper inventory then we will know which server have the software installed) . But to prevent zero day WAF is the best option https://resources.infosecinstitute.com/topic/zero-day-attacks-protections-best-practices-and-how-to-implement-them/
upvoted 3 times
...
krassko
2 years, 4 months ago
Selected Answer: B
"Vulnerability management is an essential part of an organization's IT security strategy. Effective vulnerability management helps IT security teams ensure that critical issues are discovered, analysed, and remediated as fast and efficiently as possible." It's more generic, includes technical answer like WAF
upvoted 2 times
Rollizo
2 years, 4 months ago
the issue here is that can be a zero day attack and no path is available then you need a WAF always (prevention)
upvoted 2 times
Humongous1593
2 years, 4 months ago
What makes you think a WAF would stop a zero day either?
upvoted 3 times
...
...
...
kasiya
2 years, 5 months ago
Selected Answer: C
think about log4j
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago