PrepAway - Latest Free Exam Questions & Answers

Which of the following might the CISO present?

A chief information security officer (CISO) is providing a presentation to a group of network
engineers. In the presentation, the CISO presents information regarding exploit kits. Which of the
following might the CISO present?

PrepAway - Latest Free Exam Questions & Answers

A.
Exploit kits are tools capable of taking advantage of multiple CVEs

B.
Exploit kits are vulnerability scanners used by penetration testers

C.
Exploit kits are WIFI scanning tools that can find new honeypots

D.
Exploit kits are a new type of malware that allow attackers to control their computers

One Comment on “Which of the following might the CISO present?

  1. Super_Mario says:

    First for some definitions:
    Exploit kits are automated threats that utilize compromised websites to divert web traffic, scan for vulnerable browser-based applications, and run malware.
    Exploit kits were developed as a way to automatically and silently exploit vulnerabilities on victims’ machines while browsing the web.
    An exploit kit or exploit pack is a type of toolkit cybercriminals use to attack vulnerabilities in systems so they can distribute malware or perform other malicious activities. Exploit kits are packaged with exploits that can target commonly installed software such as Adobe Flash®, Java®, Microsoft Silverlight®.
    A typical exploit kit usually provides a management console, a bunch of vulnerabilities targeted to different applications, and several add-on functions that make it easier for a cybercriminal to launch an attack.

    What is the CVE?
    The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures.
    The Security Content Automation Protocol uses CVE, and CVE IDs are listed on MITRE’s system as well as in the US National Vulnerability Database.

    The great thing about this question is the fact that they gave us only one possible answer, as B, C and D are an utter technical tosh




    0



    0

Leave a Reply