CISSP Exam QuestionsBrowse all questions from this exam

CISSP Exam - Question 143


A security practitioner detects an Endpoint attack on the organization's network. What is the MOST reasonable approach to mitigate future Endpoint attacks?

Show Answer
Correct Answer: B

To mitigate future Endpoint attacks, hardening the client image before deployment is the most reasonable approach. This involves configuring the system to meet security best practices, removing or disabling unnecessary software or services, and implementing appropriate security controls. By doing so, the attack surface of each endpoint is significantly reduced, making it more difficult for attackers to exploit vulnerabilities. This preventive measure addresses the core security posture of the organization’s endpoints, thus diminishing the likelihood of future attacks.

Discussion

15 comments
Sign in to comment
stickerbush1970Option: B
Sep 13, 2022

I'm leaning more towards B than C.

jackdryan
May 12, 2023

B is correct

gioviOption: B
Oct 5, 2022

B makes more sense

cryptofettiOption: B
Apr 5, 2023

Why wouldn't hardening the client image be more desired? Harden the client image before deployment is the most reasonable approach to mitigating future Endpoint attacks. Hardening the client image involves removing or disabling any unnecessary software or services, configuring the system to meet security best practices, and implementing appropriate security controls. By removing or disabling unnecessary software or services, the attack surface of the system is reduced, making it more difficult for attackers to exploit vulnerabilities in the system.

74gjd_37Option: B
Sep 23, 2023

The most reasonable approach to mitigate future Endpoint attacks would be to harden the client image before deployment. This means ensuring that the endpoint devices are properly configured, patched, and updated to reduce vulnerabilities that can be exploited by attackers. This approach would help to prevent future attacks and improve the overall security posture of the organization. The other options listed can also be helpful in improving security, but hardening the client image is the best first step to take in this scenario.

franbarproOption: B
Oct 16, 2022

B it is

DMODOption: C
May 12, 2023

I was struggeling between B and C. Because B is general preventive against various misconfiguration and C is a mitigation to specific threads (which may or may not a configuration issue) I choose C. C also covers common vulnerability scanning and so on.

YesPleaseOption: B
Dec 12, 2023

Answer B) B will make the attack surface footprint smaller. Both C and D are essentially the same (one looks for and the other blocks...but in both case you have to know exactly what you are looking for and this will not help at all with ZERO DAY exploits).

IXoneOption: C
Oct 25, 2022

could be corrected C, restricting compliance and security policies that reduce the attack surface of endpoints

oudmasterOption: B
Dec 26, 2022

My heart tells me B

meelaanOption: B
Dec 29, 2022

B looks right

Bach1968Option: C
Jul 6, 2023

screening for harmful exploits of client-side services before implementation (option C) is also an important approach to mitigate future Endpoint attacks. Screening for harmful exploits involves assessing and evaluating client-side services and their potential vulnerabilities before they are implemented in the network. By conducting security assessments and testing for known vulnerabilities or exploits, organizations can identify and address potential risks and weaknesses in client-side services. This proactive approach helps prevent the introduction of vulnerable software or services that could be targeted by attackers. Both options B (hardening the client image) and C (screening for harmful exploits) are important steps to enhance the security of endpoints and mitigate the risk of future attacks. These measures should be implemented in combination to establish a robust defense against Endpoint attacks.

shmoeeeOption: C
Nov 24, 2023

It''s between B and C. I'm going with C because it seems more managerial. Hardening the endpoint seems more technical

shmoeee
Nov 24, 2023

Also want to note that although the image is hardened, that doesn't mean it is fully protected from all endpoint attacks. At least after screening, you will know all the possible attacks before deployment. These screen attacks can determine necessary endpoint configurations.IMO

hoho2000Option: C
Mar 8, 2024

Would go with C. Question is on security and ask REASONABLY, so which option aligns more towards how a security reaction would be? Hardening is part and parcel but will it really stop attacks? Rem TOCTOU concept. Screening action has more biased towards Security aspect although also susceptible to TOCTOU. Try not to over think between the 2.

sbear123Option: C
Mar 22, 2024

I chose C as all other options are targeting specific cause of attack. Question does not mention the reason of attack.

klarak
Apr 19, 2024

I can't even figure out what the question has to do with the answers...