Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 222

A security analyst runs a vulnerability scan on a network administrator's workstation. The network administrator has direct administrative access to the company’s SSO web portal. The vulnerability scan uncovers critical vulnerabilities with equally high CVSS scores for the user's browser, OS, email client, and an offline password manager. Which of the following should the security analyst patch FIRST?

    Correct Answer: D

    The first priority for patching should be the Operating System (OS). The OS is the foundation on which all other applications run, and a vulnerability in the OS can affect the entire system, potentially allowing an attacker to gain full control over the workstation. This could compromise not only the applications but also the network administrator's access to critical systems, including the company’s SSO web portal. Securing the OS reduces the risk of attackers exploiting other vulnerabilities on the system.

Discussion
CockOption: D

The highest priority for patching should be given to the Operating System (OS) first. This is because the OS is the foundation of the workstation and critical system functions depend on it. A compromised OS could mean that all the other applications and software running on the system are exposed to risks even with patched applications. Once all security holes from the OS are patched, then the security analyst should patch the browser, email client, and password manager in that order of priority.

dragonflysecurityOption: C

Given that the network administrator has direct administrative access to the company’s SSO web portal, it is crucial to prioritize the patching of vulnerabilities that can be exploited through the SSO web portal. Out of the vulnerabilities mentioned, the vulnerability in the user's browser is the most likely to be exploited through the SSO web portal. Therefore, it should be patched first to minimize the risk of a potential attacker gaining unauthorized access to the company's network.

Ariel235788

The OS being vulnerable would have a larger attack surface

hb0011

I think the fact that they specifically mention the sso portal is a clue that they're wanting you to select C.

josepa

B: offline password manager D: OS is importan I have doubts

Ariel235788

if the OS is compromised, a TA could abuse much more. I think B would come 2nd to D

smqzbqOption: C

It is required for the administrator to use browser to connect and perform work. PM is not a must-have, so I would go with browser

isaphiltrickOption: C

99% of the time, the OS SHOULD be patched first but there's always exceptions, especially in cybersecurity. The question clearly states that "the network admin has direct administrative access to the company's SSO web portal." That means if that vulnerability is not addressed first, a hacker may be able to use session hijacking or other browser-based attacks to gain access to the SSO portal where hacker can then create privileged accounts for undetected entry in the future. By the time you patch your OS, your entire organization may have already been compromised by this web vulnerability.

SangSangOption: C

OS is critical and need to patch as soon as possible, but OS often require a higher level of sophistication to exploit remotely, require local access or complex exploitation methods. OS compromise could allow full system control but might require additional steps to reach sensitive applications like the SSO portal. Browsers are frequently targeted by attackers because they are used to access the web, including the SSO web portal. Exploiting a browser vulnerability could allow an attacker to execute code, steal session cookies, or perform phishing attacks to gain access to the SSO portal and other sensitive systems. => Browsers are frequently exposed to web-based threats, compromising the browser could lead to immediate access to web-based applications, including the SSO portal, through session hijacking, credential theft, or phishing.

talosDevbotOption: D

Patching the OS should be highest-priority Source: https://usa.kaspersky.com/blog/patching-priorities/28808/#:~:text=Operating%20systems,installed%20as%20quickly%20as%20possible.

Ariel235788Option: D

D. OS (Operating System). Explanation: OS Vulnerabilities: Operating system vulnerabilities often have broad-reaching consequences, as the OS provides the foundation for all other software running on the system. If the network administrator's workstation is compromised due to an OS vulnerability, it could lead to unauthorized access to critical systems and resources, including the SSO web portal. Browser, Email Client, and Password Manager: While vulnerabilities in these applications are also important to address, they are typically considered secondary to OS vulnerabilities. Compromising an OS can provide attackers with a higher level of control and access, potentially leading to the exploitation of other applications. Risk Prioritization: In vulnerability management, it's common to prioritize patching based on risk, which may consider factors such as the impact of exploitation, the availability of exploits, and the importance of the affected systems. Given that the network administrator has access to sensitive systems, protecting the OS is a primary concern.

CXSSPOption: D

By patching the operating system (OS) vulnerabilities first, you reduce the overall attack surface and mitigate potential security risks. After that, you can address the vulnerabilities in the browser, email client, and password manager in order of their severity. However, prioritizing the OS is essential to prevent attackers from exploiting vulnerabilities at the core of the system.

strong1Option: C

The network administrator has direct administrative access to the company's SSO web portal, and the browser is the primary tool they use to interact with web applications, including the SSO portal. If the browser has critical vulnerabilities, it could be exploited to C: compromise the administrator's workstation and potentially gain access to sensitive systems and data through the SSO portal. Therefore, patching the browser vulnerabilities should be the first priority.

OneSaintOption: B

Password Manager Server