CAS-005 · Question #319
CAS-005 Question #319: Real Exam Question with Answer & Explanation
The correct answer is D: Unneeded services disabled. To mitigate the identified endpoint vulnerabilities, the best actions are disabling unneeded services to close unsecured ports, patching legacy endpoint protection software, and removing unused accounts for terminated personnel.
Question
A recent security audit identified multiple endpoints have the following vulnerabilities: - Various unsecured open ports - Active accounts for terminated personnel - Endpoint protection software with legacy versions - Overly permissive access rules Which of the following would best mitigate these risks? (Select three).
Options
- ALocal drive encryption
- BSecure boot
- CAddress space layout randomization
- DUnneeded services disabled
- EPatching
- FLogging
- GRemoval of unused accounts
- HEnabling BIOS password
Explanation
To mitigate the identified endpoint vulnerabilities, the best actions are disabling unneeded services to close unsecured ports, patching legacy endpoint protection software, and removing unused accounts for terminated personnel.
Common mistakes.
- A. Local drive encryption protects data at rest but does not directly mitigate unsecured open ports, active terminated accounts, legacy software, or overly permissive access rules.
- B. Secure boot ensures that only trusted software loads at startup but does not address runtime issues like open ports, account management, or outdated software versions.
- C. Address Space Layout Randomization (ASLR) is a memory protection technique that helps prevent exploit development but does not directly address the specific vulnerabilities listed like open ports or account management.
- F. Logging is crucial for detection and investigation but is a reactive measure and does not actively mitigate the identified vulnerabilities.
- H. Enabling a BIOS password secures access to BIOS settings but does not mitigate unsecured open ports, active terminated accounts, legacy software, or overly permissive access rules at the operating system or application level.
Concept tested. Endpoint security, vulnerability remediation, basic security hygiene
Reference. https://www.cisecurity.org/cybersecurity-best-practices/cis-controls/v8/implementation-groups/ig1
Community Discussion
No community discussion yet for this question.