Exam CISSP All QuestionsBrowse all questions from this exam
Question 82

Which of the following threats would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities?

    Correct Answer: B

    Monitoring assets containing open source libraries for vulnerabilities would most likely mitigate threats associated with Advanced Persistent Threats (APTs). APTs often exploit known vulnerabilities in software, including open source components, as part of their multi-faceted attacks. By actively monitoring and updating these libraries, organizations can close potential security gaps that APTs might exploit. Zero-day attacks, on the other hand, involve vulnerabilities that are unknown to both the vendor and users, making them difficult to mitigate solely through monitoring known vulnerabilities in open source libraries.

Discussion
irEd1Option: C

C. Zero day attacks. A zero day attack means the vulnerability was present from day 0. The only thing that would prevent it is constantly checking your open source libraries to see if there are updates because of a vulnerability. Same as patches and updates.

Ramye

Wrong definition. Zero Day attack means - any vulnerabilities / threat which is unknown and does not have any solution at this time. So you don’t know you most likely monitor for known issues.

CuteRabbit168Option: B

Unlikely able to detect and mitigate zero-day attacks. Libraries may contain scripts that APTs can use to perform malicious activities

jackdryan

B is correct

IntheZoneOption: C

Reading how many people say Zero Attack makes me not want to open the comment section ever again!!

Ramye

Okay you’re pissed but what’s your answer and explanation? Explain so it helps others….

thanhlbOption: C

C include B

Bach1968Option: C

The threat that would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities is option C: Zero-day attack. A zero-day attack refers to an attack that exploits a previously unknown vulnerability in software before the software vendor has had a chance to patch or fix it. These vulnerabilities can exist in open source libraries that are commonly used in various applications and systems. By monitoring assets containing open source libraries for vulnerabilities, organizations can stay informed about any newly discovered vulnerabilities or weaknesses in these libraries. This allows them to take proactive measures, such as applying patches or updates, implementing workarounds, or finding alternative solutions, to mitigate the risk of zero-day attacks. While monitoring assets for open source vulnerabilities can contribute to overall security and help mitigate other threats as well, such as B (APT attempts) or D (phishing attempts), it is particularly relevant in addressing the risks associated with zero-day attacks.

CCNPWILLOption: B

B is the best answer out of all choices.

RamyeOption: B

A Zero Day means exploiting those vulnerabilities for what there are no solutions yet. And these could be that it was not discovered and known to vendors yet. So you can’t take action for threats that are unknown, so the answer most likely is B. But anyone has confirmed answer pls confirm. Thx

Jenkins3molOption: A

You are never going to beat 0day or apt. Come on.

Jenkins3molOption: C

Well, I think you will never be able to mitigate apt risk, because they've got to get you. It's just a question of time. And APT does possessed and developed lots of Zero-day vulnerabilities as well.

CCNPWILLOption: C

I agree with C as well.

dm808Option: C

The answer is C. As stated earlier by thanhlb, C includes B.. or part of B.. APTs use zero days.. but also employ Social Engineering, which wouldn't be covered in a vulnerability library

Vasyamba1Option: B

From the v.9th OSG - One of the key differences between APT attackers and other malware authors is that these malware developers often have access to zero-day exploits that are not known to software vendors. So, B includes C

HongjunOption: B

Zero day attacks means nobody know this weak point at current time. So even you check the code you still don't know . But you can improve your code to prevent the knowed APT attacks.

lexvatherOption: C

is Zero Days, the most likely in open source is Zero Day attacks, instead the APTs, can compromise a organization no just by monitoring the assets with open source, the TTPs used by APTs can process more than assets in open source.

BoZTOption: C

Most likely is C, in the real world

HughJassoleOption: C

C: Zero day attack. "Software often has security vulnerabilities that hackers can exploit" https://usa.kaspersky.com/resource-center/definitions/zero-day-exploit It isn't B because APT is not about a vulnerability in the software, it's an overall attack strategy: https://www.imperva.com/learn/application-security/apt-advanced-persistent-threat/

YokotaOption: C

Open source libraries are widely used in software development, and they can contain vulnerabilities that are discovered over time. Monitoring these assets for vulnerabilities involves staying updated on the latest security advisories, patches, and fixes related to the open source libraries in use. By actively monitoring open source libraries for vulnerabilities, organizations can identify and address security issues promptly. This reduces the risk of attackers exploiting previously unknown vulnerabilities (zero-day vulnerabilities) present in the open source libraries.