CAS-003 Exam: CompTIA CASP+ Practice Questions and Answers

Where to Find Information on the Recent Exploit Attack: Administrator's Guide

Question

A systems administrator receives an advisory email that a recently discovered exploit is being used in another country and the financial institutions have ceased operations while they find a way to respond to the attack.

Which of the following BEST describes where the administrator should look to find information on the attack to determine if a response must be prepared for the systems? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E. F.

BE.

The administrator needs to find information on the attack to determine if a response must be prepared for the systems. Here are the two best places to look for this information:

  1. Antivirus vendor websites: Antivirus vendors are among the first to detect and respond to new threats, and they often provide information on the latest threats and how to mitigate them. They typically have a wealth of information on the latest exploits, including details on how they work, what systems they affect, and what can be done to protect against them.

  2. CVE database: CVE stands for Common Vulnerabilities and Exposures. It is a publicly available database that contains information about known vulnerabilities in various software systems. CVE identifiers are assigned to vulnerabilities by a centralized authority, making it easier for administrators and security professionals to track and respond to new threats. By checking the CVE database, the administrator can determine if there is a known vulnerability that is being exploited in the wild, and what can be done to mitigate it.

Option A (Bug bounty websites) and option B (Hacker forums) may not provide reliable or accurate information about the exploit, and may even be sources of misinformation or disinformation. Option D (Trade industry association websites) may not have information specific to the current attack, and option F (Company's legal department) may not have technical information about the attack.

Therefore, the best options for finding information on the attack to determine if a response must be prepared for the systems are antivirus vendor websites and the CVE database.