CISSP Exam QuestionsBrowse all questions from this exam

CISSP Exam - Question 82


Which of the following threats would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities?

Show Answer
Correct Answer: B

Monitoring assets containing open source libraries for vulnerabilities would most likely mitigate threats associated with Advanced Persistent Threats (APTs). APTs often exploit known vulnerabilities in software, including open source components, as part of their multi-faceted attacks. By actively monitoring and updating these libraries, organizations can close potential security gaps that APTs might exploit. Zero-day attacks, on the other hand, involve vulnerabilities that are unknown to both the vendor and users, making them difficult to mitigate solely through monitoring known vulnerabilities in open source libraries.

Discussion

17 comments
Sign in to comment
CuteRabbit168Option: B
Sep 8, 2022

Unlikely able to detect and mitigate zero-day attacks. Libraries may contain scripts that APTs can use to perform malicious activities

jackdryan
May 11, 2023

B is correct

irEd1Option: C
Jan 26, 2023

C. Zero day attacks. A zero day attack means the vulnerability was present from day 0. The only thing that would prevent it is constantly checking your open source libraries to see if there are updates because of a vulnerability. Same as patches and updates.

Ramye
Jun 24, 2024

Wrong definition. Zero Day attack means - any vulnerabilities / threat which is unknown and does not have any solution at this time. So you don’t know you most likely monitor for known issues.

Bach1968Option: C
Jul 5, 2023

The threat that would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities is option C: Zero-day attack. A zero-day attack refers to an attack that exploits a previously unknown vulnerability in software before the software vendor has had a chance to patch or fix it. These vulnerabilities can exist in open source libraries that are commonly used in various applications and systems. By monitoring assets containing open source libraries for vulnerabilities, organizations can stay informed about any newly discovered vulnerabilities or weaknesses in these libraries. This allows them to take proactive measures, such as applying patches or updates, implementing workarounds, or finding alternative solutions, to mitigate the risk of zero-day attacks. While monitoring assets for open source vulnerabilities can contribute to overall security and help mitigate other threats as well, such as B (APT attempts) or D (phishing attempts), it is particularly relevant in addressing the risks associated with zero-day attacks.

thanhlbOption: C
Oct 30, 2023

C include B

IntheZoneOption: C
Jan 18, 2024

Reading how many people say Zero Attack makes me not want to open the comment section ever again!!

Ramye
May 18, 2024

Okay you’re pissed but what’s your answer and explanation? Explain so it helps others….

YokotaOption: C
Jun 11, 2023

Open source libraries are widely used in software development, and they can contain vulnerabilities that are discovered over time. Monitoring these assets for vulnerabilities involves staying updated on the latest security advisories, patches, and fixes related to the open source libraries in use. By actively monitoring open source libraries for vulnerabilities, organizations can identify and address security issues promptly. This reduces the risk of attackers exploiting previously unknown vulnerabilities (zero-day vulnerabilities) present in the open source libraries.

HughJassoleOption: C
Jun 23, 2023

C: Zero day attack. "Software often has security vulnerabilities that hackers can exploit" https://usa.kaspersky.com/resource-center/definitions/zero-day-exploit It isn't B because APT is not about a vulnerability in the software, it's an overall attack strategy: https://www.imperva.com/learn/application-security/apt-advanced-persistent-threat/

BoZTOption: C
Aug 23, 2023

Most likely is C, in the real world

lexvatherOption: C
Feb 22, 2024

is Zero Days, the most likely in open source is Zero Day attacks, instead the APTs, can compromise a organization no just by monitoring the assets with open source, the TTPs used by APTs can process more than assets in open source.

HongjunOption: B
Mar 3, 2024

Zero day attacks means nobody know this weak point at current time. So even you check the code you still don't know . But you can improve your code to prevent the knowed APT attacks.

Vasyamba1Option: B
Mar 21, 2024

From the v.9th OSG - One of the key differences between APT attackers and other malware authors is that these malware developers often have access to zero-day exploits that are not known to software vendors. So, B includes C

dm808Option: C
Mar 28, 2024

The answer is C. As stated earlier by thanhlb, C includes B.. or part of B.. APTs use zero days.. but also employ Social Engineering, which wouldn't be covered in a vulnerability library

CCNPWILLOption: C
Apr 18, 2024

I agree with C as well.

Jenkins3molOption: C
May 1, 2024

Well, I think you will never be able to mitigate apt risk, because they've got to get you. It's just a question of time. And APT does possessed and developed lots of Zero-day vulnerabilities as well.

Jenkins3molOption: A
May 5, 2024

You are never going to beat 0day or apt. Come on.

RamyeOption: B
May 18, 2024

A Zero Day means exploiting those vulnerabilities for what there are no solutions yet. And these could be that it was not discovered and known to vendors yet. So you can’t take action for threats that are unknown, so the answer most likely is B. But anyone has confirmed answer pls confirm. Thx

CCNPWILLOption: B
Jun 4, 2024

B is the best answer out of all choices.