ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 254 - CS0-003 discussion

Report
Export

A company has a primary control in place to restrict access to a sensitive database. However, the company discovered an authentication vulnerability that could bypass this control. Which of the following is the best compensating control?

A.
Running regular penetration tests to identify and address new vulnerabilities
Answers
A.
Running regular penetration tests to identify and address new vulnerabilities
B.
Conducting regular security awareness training of employees to prevent social engineering attacks
Answers
B.
Conducting regular security awareness training of employees to prevent social engineering attacks
C.
Deploying an additional layer of access controls to verify authorized individuals
Answers
C.
Deploying an additional layer of access controls to verify authorized individuals
D.
Implementing intrusion detection software to alert security teams of unauthorized access attempts
Answers
D.
Implementing intrusion detection software to alert security teams of unauthorized access attempts
Suggested answer: C

Explanation:

Deploying an additional layer of access controls to verify authorized individuals is the best compensating control for the authentication vulnerability that could bypass the primary control. A compensating control is a security measure that is implemented to mitigate the risk of a vulnerability or a threat when the primary control is not sufficient or feasible. A compensating control should provide a similar or greater level of protection as the primary control, and should be closely related to the vulnerability or the threat it is addressing1. In this case, the primary control is to restrict access to a sensitive database, and the vulnerability is an authentication bypass. Therefore, the best compensating control is to deploy an additional layer of access controls, such as multifactor authentication, role-based access control, or encryption, to verify the identity and the authorization of the individuals who are accessing the database. This way, the compensating control can prevent unauthorized access to the database, even if the primary control is bypassed23. Running regular penetration tests, conducting regular security awareness training, and implementing intrusion detection software are all good security practices, but they are not compensating controls for the authentication vulnerability, as they do not provide a similar or greater level of protection as the primary control, and they are not closely related to the vulnerability or the threat they are addressing.

Reference: Compensating Controls: An Impermanent Solution to an IT ... - Tripwire, What is Multifactor Authentication (MFA)? | Duo Security, Role-Based Access Control (RBAC) and Role-Based Security, [What is a Penetration Test and How Does It Work?]

asked 02/10/2024
Giorgio Bertocchi
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first