ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 95 - PT0-003 discussion

Report
Export

During an engagement, a penetration tester found some weaknesses that were common across the customer's entire environment. The weaknesses included the following:

Weaker password settings than the company standard

Systems without the company's endpoint security software installed

Operating systems that were not updated by the patch management system

Which of the following recommendations should the penetration tester provide to address the root issue?

A.
Add all systems to the vulnerability management system.
Answers
A.
Add all systems to the vulnerability management system.
B.
Implement a configuration management system.
Answers
B.
Implement a configuration management system.
C.
Deploy an endpoint detection and response system.
Answers
C.
Deploy an endpoint detection and response system.
D.
Patch the out-of-date operating systems.
Answers
D.
Patch the out-of-date operating systems.
Suggested answer: B

Explanation:

Identified Weaknesses:

Weaker password settings than the company standard: Indicates inconsistency in password policies across systems.

Systems without the company's endpoint security software installed: Suggests lack of uniformity in security software deployment.

Operating systems not updated by the patch management system: Points to gaps in patch management processes.

Configuration Management System:

Definition: A configuration management system automates the deployment, maintenance, and enforcement of configurations across all systems in an organization.

Benefits: Ensures consistency in security settings, software installations, and patch management across the entire environment.

Examples: Tools like Ansible, Puppet, and Chef can help automate and manage configurations, ensuring compliance with organizational standards.

Other Recommendations:

Vulnerability Management System: While adding systems to this system helps track vulnerabilities, it does not address the root cause of configuration inconsistencies.

Endpoint Detection and Response (EDR): Useful for detecting and responding to threats, but not for enforcing consistent configurations.

Patch Management: Patching systems addresses specific vulnerabilities but does not solve broader configuration management issues.

Pentest

Reference:

System Hardening: Ensuring all systems adhere to security baselines and configurations to reduce attack surfaces.

Automation in Security: Using configuration management tools to automate security practices, ensuring compliance and reducing manual errors.

Implementing a configuration management system addresses the root issue by ensuring consistent security configurations, software deployments, and patch management across the entire environment.

asked 02/10/2024
Jessica Martinada
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first