Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 468 discussion

Actual exam question from ISC's CISSP
Question #: 468
Topic #: 1
[All CISSP Questions]

Which of the following is MOST effective method of defending against zero-day malware threats?

  • A. Client firewalls
  • B. Client event logging
  • C. Client application whitelisting
  • D. Client antivirus
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
GuardianAngel
9 months, 2 weeks ago
C. Client application whitelisting application whitelisting is mentioned in all three sources. An EDGE NOT CLIENT firewall is also mentioned but whitelisting is the only consistent method that is listed in the choices. https://www.sentinelone.com/cybersecurity-101/zero-day-vulnerabilities-attacks/?utm_source=gdn-paid&utm_medium=paid-display&utm_campaign=nam-pmax-brand-ppc&utm_term=&campaign_id=19502097988&ad_id=&gad_source=1&gclid=CjwKCAiAt5euBhB9EiwAdkXWOxoh9lurCyjaFfOjo8GqIopGgHLT7SfgAE7zixwHM7O7G98IKofzfxoCizEQAvD_BwE https://cybriant.com/how-to-prevent-zero-day-attacks-in-5-steps/ https://www.faronics.com/news/blog/zero-day-vulnerabilities-stop-threat-cant-see-coming
upvoted 1 times
...
Soleandheel
11 months, 1 week ago
C. Client application whitelisting The most effective method of defending against zero-day malware threats is typically client application whitelisting. Application whitelisting involves allowing only trusted and approved applications to run on a system while blocking all others. This approach is effective against zero-day threats because it focuses on permitting known, legitimate applications and denies the execution of any unauthorized or unknown software.
upvoted 2 times
...
tepes
1 year, 3 months ago
Selected Answer: C
application whitelisting is a proactive security measure that can prevent zero-day threats from reaching your endpoints
upvoted 1 times
...
HughJassole
1 year, 5 months ago
"One of the most effective ways to prevent zero-day attacks is deploying a web application firewall (WAF) on the network edge. A WAF reviews all incoming traffic and filters out malicious inputs that might target security vulnerabilities." https://www.imperva.com/learn/application-security/zero-day-exploit/#:~:text=One%20of%20the%20most%20effective,that%20might%20target%20security%20vulnerabilities. But A states "client firewall" so that's not correct. C seems the only other option. "When it comes to preventing zero day threats and new, signatureless, or mutated malware from executing, the most effective method is application whitelisting." https://www.faronics.com/news/blog/zero-day-vulnerabilities-stop-threat-cant-see-coming
upvoted 3 times
HappyDay030303
1 year ago
Hugh, thank you, sir You CONSISTENTLY research and produce solid answers wherever you are, we all thank you sir!
upvoted 1 times
...
...
aleXplicitly
1 year, 7 months ago
Selected Answer: A
Client firewall seems to be the best answer of the 4 because even with application whitelisting, the application itself can be exploited.
upvoted 1 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
Delab202
1 year, 7 months ago
One of the most effective ways to prevent zero-day attacks is deploying a web application firewall (WAF) on the network edge. A WAF reviews all incoming traffic and filters out malicious inputs that might target security vulnerabilities.
upvoted 1 times
...
Goseu
1 year, 8 months ago
Selected Answer: C
As per Chat-GPT : Client application whitelisting is the most effective method of defending against zero-day malware threats.
upvoted 2 times
...
sausageman
1 year, 8 months ago
Selected Answer: C
Definitely Client Application Whitelisting. Similar question in other exams. Allowing only specific applications can reduce the risk of zero days. Less attack surface as well.
upvoted 2 times
...
ScottUrbina
1 year, 8 months ago
Selected Answer: D
Antivirus can be signature based or heuristic, according to this, an heuristic the heuristic model was specifically designed to spot suspicious characteristics that can be found in unknown, new viruses and modified versions of existing threats as well as known malware samples.
upvoted 1 times
...
JohnyDal
1 year, 9 months ago
antivirus works on signatures, zero day doesnt have one. Logging/monitoring helps accountabiility. Client whitelisting allows only allowed apps to be installed. Allowed apps may also have zero-day vulnerability. The only option that makes sense here is "client based firewall." The firewall will only allow specific ports/protocols and block all else. Even if a firewall-allowed port/protocol becomes a vector, this is still the best option by far than the rest of the 3
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...