ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 82 - CS0-003 discussion

Report
Export

A security analyst needs to ensure that systems across the organization are protected based on the sensitivity of the content each system hosts. The analyst is working with the respective system owners to help determine the best methodology that seeks to promote confidentiality, availability, and integrity of the data being hosted. Which of the following should the security analyst perform first to categorize and prioritize the respective systems?

A.
Interview the users who access these systems,
Answers
A.
Interview the users who access these systems,
B.
Scan the systems to see which vulnerabilities currently exist.
Answers
B.
Scan the systems to see which vulnerabilities currently exist.
C.
Configure alerts for vendor-specific zero-day exploits.
Answers
C.
Configure alerts for vendor-specific zero-day exploits.
D.
Determine the asset value of each system.
Answers
D.
Determine the asset value of each system.
Suggested answer: D

Explanation:

Determining the asset value of each system is the best action to perform first, as it helps to categorize and prioritize the systems based on the sensitivity of the data they host. The asset value is a measure of how important a system is to the organization, in terms of its financial, operational, or reputational impact. The asset value can help the security analyst to assign a risk level and a protection level to each system, and to allocate resources accordingly. The other actions are not as effective as determining the asset value, as they do not directly address the goal of promoting confidentiality, availability, and integrity of the data. Interviewing the users who access these systems may provide some insight into how the systems are used and what data they contain, but it may not reflect the actual value or sensitivity of the data from an organizational perspective. Scanning the systems to see which vulnerabilities currently exist may help to identify and remediate some security issues, but it does not help to categorize or prioritize the systems based on their data sensitivity. Configuring alerts for vendor-specific zero-day exploits may help to detect and respond to some emerging threats, but it does not help to protect the systems based on their data sensitivity.

asked 02/10/2024
Alireza Noura
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first