ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 29 - CAS-004 discussion

Report
Export

A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open-source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away.

Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?

A.
Scan the code with a static code analyzer, change privileged user passwords, and provide security training.
Answers
A.
Scan the code with a static code analyzer, change privileged user passwords, and provide security training.
B.
Change privileged usernames, review the OS logs, and deploy hardware tokens.
Answers
B.
Change privileged usernames, review the OS logs, and deploy hardware tokens.
C.
Implement MFA, review the application logs, and deploy a WAF.
Answers
C.
Implement MFA, review the application logs, and deploy a WAF.
D.
Deploy a VPN, configure an official open-source library repository, and perform a full application review for vulnerabilities.
Answers
D.
Deploy a VPN, configure an official open-source library repository, and perform a full application review for vulnerabilities.
Suggested answer: C

Explanation:

Implementing MFA can add an extra layer of security to protect against unauthorized access if the vulnerability is exploited. Reviewing the application logs can help identify if any attempts have been made to exploit the vulnerability, and deploying a WAF can help block any attempts to exploit the vulnerability. While the other options may provide some level of security, they may not directly address the vulnerability and may not reduce the risk to an acceptable level.

asked 02/10/2024
Emanuel Popescu
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first