Security staff learn that a group has large funding for research and develops new vulnerabilities. Which factor must be included in the modeling process to address these adversaries when planning defenses?
Examine new infiltration methods that exploit unknown vulnerabilities
Maintain routine scans to detect basic open ports in the environment
Schedule patches for all known software flaws at consistent intervals
Prioritize a training program to solve phishing problems within the team
Analyzing the possibility of custom-created exploits and infiltration approaches is essential when dealing with well-equipped groups. Awareness training and routine scans help mitigate standard threats, but they do not fully address attacks that leverage unknown weaknesses. A regular patch schedule is useful, but it leaves gaps if the attacker can design unforeseen exploits.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are unknown vulnerabilities, and how do they differ from known vulnerabilities?
Open an interactive chat with Bash
How can a threat model help address adversaries with custom-created exploits?
Open an interactive chat with Bash
What defensive methods can mitigate zero-day attacks effectively?