An organization is worried that extranet login portals and unrecognized social media accounts might allow external observers to discover new vulnerabilities. Which measure best reduces these hazards while maintaining accountability for any discovered issues?
Enforce multifactor authentication for users on the internal network, preventing unauthorized access to local resources
Implement ongoing open-source searches for unauthorized references and portals, and follow documented remediation steps for any new findings
Adopt a single vendor blocklist to filter connections and reduce access to sites flagged as malicious
Rely on vulnerability assessment tools to detect and remediate known software exploits on externally exposed devices
The most effective approach involves conducting repeated searches for open-source mentions of the organization’s brand and portals and ensuring any unexpected items found are carefully reviewed and resolved. Other approaches can help with different risks but do not focus on uncovering or managing external exposures such as rogue references, unauthorized domains, or vacant subdomains. Relying on vulnerability scans alone might miss unregistered exposures, restricting remedial activities to known software flaws. Implementing multifactor authentication helps within controlled environments but does not address uncharted web postings. A blocklist might prevent certain malicious connections but does not identify hidden or unauthorized uses of the brand on the open internet.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are open-source searches and how do they help mitigate risks?
Open an interactive chat with Bash
Why is relying solely on vulnerability assessment tools insufficient in this context?
Open an interactive chat with Bash
How do unauthorized social media accounts or rogue domains pose a risk to an organization?