ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 193 - CS0-003 discussion

Report
Export

A company is deploying new vulnerability scanning software to assess its systems. The current network is highly segmented, and the networking team wants to minimize the number of unique firewall rules. Which of the following scanning techniques would be most efficient to achieve the objective?

A.
Deploy agents on all systems to perform the scans.
Answers
A.
Deploy agents on all systems to perform the scans.
B.
Deploy a central scanner and perform non-credentialed scans.
Answers
B.
Deploy a central scanner and perform non-credentialed scans.
C.
Deploy a cloud-based scanner and perform a network scan.
Answers
C.
Deploy a cloud-based scanner and perform a network scan.
D.
Deploy a scanner sensor on every segment and perform credentialed scans.
Answers
D.
Deploy a scanner sensor on every segment and perform credentialed scans.
Suggested answer: A

Explanation:

USB ports are a common attack vector that can be used to deliver malware, steal data, or compromise systems. The first step to mitigate this vulnerability is to check the configurations of the company assets and disable or restrict the USB ports if possible. This will prevent unauthorized devices from being connected and reduce the attack surface. The other options are also important, but they are not the first priority in this scenario.

CompTIA CySA+ CS0-003 Certification Study Guide, page 247

What are Attack Vectors: Definition & Vulnerabilities, section ''How to secure attack vectors''

Are there any attack vectors for a printer connected through USB in a Windows environment?, answer by user ''schroeder''

asked 02/10/2024
Cristian Bello Henriquez
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first