ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 342 - CS0-003 discussion

Report
Export

A company's internet-facing web application has been compromised several times due to identified design flaws. The company would like to minimize the risk of these incidents from reoccurring and has provided the developers with better security training. However, the company cannot allocate any more internal resources to the issue. Which of the following are the best options to help identify flaws within the system? (Select two).

A.

Deploying a WAF

Answers
A.

Deploying a WAF

B.

Performing a forensic analysis

Answers
B.

Performing a forensic analysis

C.

Contracting a penetration test

Answers
C.

Contracting a penetration test

D.

Holding a tabletop exercise

Answers
D.

Holding a tabletop exercise

E.

Creating a bug bounty program

Answers
E.

Creating a bug bounty program

F.

Implementing threat modeling

Answers
F.

Implementing threat modeling

Suggested answer: C, E

Explanation:

To identify existing vulnerabilities in the web application, the best options are to contract a penetration test and create a bug bounty program. A penetration test simulates attacks against the application to uncover security flaws proactively. A bug bounty program incentivizes external security researchers to find and report vulnerabilities, expanding the testing scope without overburdening internal resources. According to CompTIA CySA+, both methods are highly effective in identifying vulnerabilities from an external perspective, particularly when internal resources are limited. Options like a WAF (A) focus more on prevention than detection, while threat modeling (F) and tabletop exercises (D) are generally proactive measures not focused on active flaw identification.

asked 17/10/2024
Higher System Consultancy
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first