Exam SY0-701 All QuestionsBrowse all questions from this exam
Question 93

A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?

    Correct Answer: D

    The primary risk in the new system being deployed and supported by a SaaS provider is that it could potentially involve vulnerable software. Vulnerable software can be exploited by attackers to gain unauthorized access or cause damage to the system. This risk is significant because it directly affects the security and integrity of the new system being deployed. It is crucial to ensure that the software is secure, up-to-date, and free from known vulnerabilities to mitigate this risk.

Discussion
Etc_Shadow28000Option: B

B. Non-segmented network Opening ports on a firewall for a new system introduces the risk that the new system might be deployed on a non-segmented network. This means that the new system and its traffic could potentially be exposed to other parts of the network, increasing the risk of lateral movement by an attacker if the system is compromised. Network segmentation helps in containing potential breaches and limiting access to sensitive areas of the network. Therefore, the correct answer is: B. Non-segmented network

hasquaatiOption: C

I am thinking that opening firewall ports is a Layer 3 and Layer 4 issue and not a Layer 7 vulnerability, which is where the Vulnerable software would fit in. I would be more concerned about the Cloud provider which is why I am choosing C: Supply Chain Vendor.

Th3irdEyeOption: D

I think the question is trying to figure out if you know what SaaS means and if you can figure out it's "Software" as a Service they expect you to pick "Vulnerable software". Even though Supply chain vendor kind of fits too I would pick D.

EOteroOption: C

Supply chain vectors • Tamper with the underlying infrastructure – Or manufacturing process • Managed service providers (MSPs) – Access many different customer networks from one location • Gain access to a network using a vendor – 2013 Target credit card breach • Suppliers – Counterfeit networking equipment – Install backdoors, substandard performance and availability – 2020 - Fake Cisco Catalyst switches

MAKOhunter33333333Option: D

It asks about the risk inside the new system which makes me think what the new system is deploying,, software.

f26ddcdOption: D

Vulnerable software

geocisOption: C

C......A supply chain vendor is a third-party entity that provides goods or services to an organization, such as a SaaS provider. A supply chain vendor can pose a risk to the new system if the vendor has poor security practices, breaches, or compromises that could affect the confidentiality, integrity, or availability of the system or its data. The organization should perform due diligence and establish a service level agreement with the vendor to mitigate this risk. The other options are not specific to the scenario of using a SaaS provider, but rather general risks that could apply to any system.

Shaman73Option: D

I think D

Abcd123321Option: D

I think D

AutoroTinkOption: D

I narrowed it down to A and D. But with the open ports, D is the more likely answer because of the increased attackers can scan the open ports and use automated tools to exploit known vulnerabilities in software. With default credentials, the attacker may have to guess or know the specific credentials.

e5c1bb5Option: D

ammending my answer i thinks its D based on key words

e5c1bb5Option: C

the question specifically mentions that the system being deployed is supported by a SaaS (Software-as-a-Service) provider. The risk associated with the new system would likely involve the security practices and integrity of the supply chain vendor providing the SaaS solution. This includes concerns such as the vendor's data handling practices, security measures, and potential vulnerabilities in their software or infrastructure.

YoezOption: D

D. Vulnerable software Deploying a new system supported by a SaaS (Software as a Service) provider can introduce risks related to vulnerable software. If the software being deployed has known vulnerabilities or weaknesses, it can expose the system to security threats such as exploitation by attackers. Therefore, ensuring that the software is up-to-date with security patches and configurations is crucial to mitigate this risk.