ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 192 - CS0-003 discussion

Report
Export

A security analyst needs to mitigate a known, exploited vulnerability related not tack vector that embeds software through the USB interface. Which of the following should the analyst do first?

A.
Conduct security awareness training on the risks of using unknown and unencrypted USBs.
Answers
A.
Conduct security awareness training on the risks of using unknown and unencrypted USBs.
B.
Write a removable media policy that explains that USBs cannot be connected to a company asset.
Answers
B.
Write a removable media policy that explains that USBs cannot be connected to a company asset.
C.
Check configurations to determine whether USB ports are enabled on company assets.
Answers
C.
Check configurations to determine whether USB ports are enabled on company assets.
D.
Review logs to see whether this exploitable vulnerability has already impacted the company.
Answers
D.
Review logs to see whether this exploitable vulnerability has already impacted the company.
Suggested answer: C

Explanation:

USB ports are a common attack vector that can be used to deliver malware, steal data, or compromise systems. The first step to mitigate this vulnerability is to check the configurations of the company assets and disable or restrict the USB ports if possible. This will prevent unauthorized devices from being connected and reduce the attack surface. The other options are also important, but they are not the first priority in this scenario.

CompTIA CySA+ CS0-003 Certification Study Guide, page 247

What are Attack Vectors: Definition & Vulnerabilities, section ''How to secure attack vectors''

Are there any attack vectors for a printer connected through USB in a Windows environment?, answer by user ''schroeder''

asked 02/10/2024
cesar ganguie
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first