CISSP Exam QuestionsBrowse all questions from this exam

CISSP Exam - Question 59


A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with which of the following controls in place?

Show Answer
Correct Answer: D

Deploying the COTS application with a hardened configuration is crucial for mitigating security risks. Hardening involves implementing secure settings, removing unnecessary features and services, and applying security best practices to reduce vulnerabilities and potential attack vectors. By configuring the COTS solution in a hardened manner, security professionals can minimize the potential for exploitation and unauthorized access, making it a vital control measure.

Discussion

17 comments
Sign in to comment
NickolosOption: A
Sep 5, 2022

The risk of what? The application being dangerous to the corporate network or the application being vulnerable to external exploits? Either way segmentation makes more sense imo.

dev46
Sep 18, 2022

True. Network Segmentation makes sense. It minimize the exposure. How can you harden COTS? It's a ready-made product.

stickerbush1970
Sep 19, 2022

I would think this mean hardening the OS, not COTS

Nickolos
Sep 20, 2022

Exactly - ensuring no unnecessary ports or services are running, access to the internet is configured properly (if at all needed), proper acl is setup, etc.

DeepCyber
Jun 3, 2023

Even if you harden the configuration It will not help If there is vulnerability in the software code which is exploited by attacker. Attacker may access your network through legitimate way to exploits your network If network segmentation is not in the place.

Moose01Option: D
Oct 1, 2023

D. Hardening I am hardening security by segmenting and limit access as needed. Segmentation is a part of Hardening.

HongjunOption: D
Mar 3, 2024

Refer to CISSP official study guide 9th chapter 20- 20.1.11

dedOption: D
Jun 28, 2023

ChatGPT says: D

Bach1968Option: D
Jul 5, 2023

D. Hardened configuration. Deploying the COTS application with a hardened configuration is an effective way to mitigate security risks. Hardening involves implementing secure settings, removing unnecessary features and services, and applying security best practices to reduce vulnerabilities and potential attack vectors. By configuring the COTS solution in a hardened manner, security professionals can minimize the potential for exploitation and unauthorized access.

homeyslOption: D
Oct 11, 2023

D. Hardened the system that will host the COTS. Segmenting it will kill the functionality of the solution.

Moose01Option: A
Nov 12, 2023

A. Network Segmentation - when introducing a new pet into your house, you have to learn the behavior and interaction with other pets before you let him loose. same here, as a security personnel you must know exactly what you introducing before hand and must be on segmented part of the network that shutting an interface can terminate all possible risks on the rest of the network. trust but verify

jieawsOption: D
Apr 13, 2024

I remembered OSG recommended D, harderning config. for COTS. Again, very important, please confine my solution within the context here. A? network segmentation could be an option, but is not the first step I shall do and is out of question context. I choose D.

HughJassoleOption: D
Jun 22, 2023

D. Network segmentation isn't per application, it's separating prod and non-prod, so that's out. Blacklisting is blocking, to allow an application you whitelist but that just allows the application to run. D is the answer, when you harden the config you make it so that the attack surface is greatly reduced.

win610Option: D
Jul 13, 2023

Harden configuration is important for cots.

sebsebaOption: A
Sep 8, 2023

No one knows the configuration of COTS, and it didn't mention, then the best way is the segmentation to lower the exposure.

Wz21
Sep 26, 2023

think like a manager with technical experience and common sense :)

YesPleaseOption: D
Dec 9, 2023

Answer D) Hardened configuration This means you remove/change configurations you don't need/want as well as change default usernames/passwords/ports/etc... Segmenting a network won't help as it would still leave the COTS exposed with defaults readily available to be exploited.

HackermayneOption: D
Jan 9, 2024

I'm saying D. As far as risk from attackers goes, I would lean towards network segmentation, however, general risk includes a lot of other factors like user accessibility, interoperability issues, etc. Segmenting it could introduce a much larger and complex workload and ultimately make it risky in that sense.

KyankaOption: D
Mar 4, 2024

Answer is D. A COTS application is not necessarily hardened by default. For example, the government uses STIGs to tell admins how to harden some applications.

ajikeOption: A
Mar 13, 2024

The question says control . Hardened configuration will mitigate if there is possibility of an attack. I will go with Network segmentation

RamyeOption: D
Jun 22, 2024

Even if you put this in a separate network segment it needs to be hardened because it is off the shelf.