ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 139 - CS0-003 discussion

Report
Export

A Chief Information Security Officer (CISO) is concerned that a specific threat actor who is known to target the company's business type may be able to breach the network and remain inside of it for an extended period of time.

Which of the following techniques should be performed to meet the CISO's goals?

A.
Vulnerability scanning
Answers
A.
Vulnerability scanning
B.
Adversary emulation
Answers
B.
Adversary emulation
C.
Passive discovery
Answers
C.
Passive discovery
D.
Bug bounty
Answers
D.
Bug bounty
Suggested answer: B

Explanation:

The correct answer is B. Adversary emulation.

Adversary emulation is a technique that involves mimicking the tactics, techniques, and procedures (TTPs) of a specific threat actor or group to test the effectiveness of the security controls and incident response capabilities of an organization1. Adversary emulation can help identify and address the gaps and weaknesses in the security posture of an organization, as well as improve the readiness and skills of the security team. Adversary emulation can also help measure the dwell time, which is the duration that a threat actor remains undetected inside the network2.

The other options are not the best techniques to meet the CISO’s goals. Vulnerability scanning (A) is a technique that involves scanning the network and systems for known vulnerabilities, but it does not simulate a real attack or test the incident response capabilities. Passive discovery © is a technique that involves collecting information about the network and systems without sending any packets or probes, but it does not identify or exploit any vulnerabilities or test the security controls.

Bug bounty (D) is a program that involves rewarding external researchers or hackers for finding and reporting vulnerabilities in an organization’s systems or applications, but it does not focus on a specific threat actor or group.

asked 02/10/2024
Radoslaw Gajewski
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first