ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 367 - CS0-003 discussion

Report
Export

A security analyst needs to identify a computer based on the following requirements to be mitigated:

The attack method is network-based with low complexity.

No privileges or user action is needed.

The confidentiality and availability level is high, with a low integrity level.

Given the following CVSS 3.1 output:

Computer1: CVSS3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H

Computer2: CVSS3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H

Computer3: CVSS3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H

Computer4: CVSS3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H

Which of the following machines should the analyst mitigate?

A.

Computer1

Answers
A.

Computer1

B.

Computer2

Answers
B.

Computer2

C.

Computer3

Answers
C.

Computer3

D.

Computer4

Answers
D.

Computer4

Suggested answer: D

Explanation:

Comprehensive Detailed

To match the mitigation criteria, we analyze each machine's CVSS (Common Vulnerability Scoring System) attributes:

Attack Vector (AV): N for network (matches the requirement of network-based attack).

Attack Complexity (AC): L for low (meets the requirement for low complexity).

Privileges Required (PR): N for none (indicating no privileges are needed).

User Interaction (UI): N for none (matches the requirement that no user action is needed).

Confidentiality (C), Integrity (I), and Availability (A): Requires high confidentiality and availability with low integrity.

From these criteria:

Computer1 requires user interaction (UI:R), which disqualifies it.

Computer2 has a local attack vector (AV:L), which disqualifies it for a network-based attack.

Computer3 has a high attack complexity (AC:H), which does not meet the low complexity requirement.

Computer4 meets all criteria: network attack vector, low complexity, no privileges, no user interaction, and appropriate confidentiality, integrity, and availability levels.

Thus, Computer4 is the correct answer.

NIST NVD (National Vulnerability Database): CVSS vector standards.

CVSS 3.1 User Guide: Explanation of each CVSS metric and its application in vulnerability prioritization.

asked 15/11/2024
Willem Alves
28 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first