A company discovers that a group with large finances is buying custom exploits. Which measure is an effective response to these specialized exploitation attempts?
Assign staff to inspect server rooms and record observations using documented procedures
Mandate complex sign-on credentials across all departments
Implement a process that uses data updates to refine protective measures and adapt to emerging tactics
Use off-the-shelf scanning software that offers standard threat identification
A dynamic approach that processes ongoing threat intelligence facilitates managing specialized threats. This method integrates newly identified techniques into protective measures. Other approaches, such as commercial scanning tools with standard threat identification, focusing on credential policies, or routine physical inspections, do not address evolving and highly funded intrusion efforts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a custom exploit?
Open an interactive chat with Bash
How does ongoing threat intelligence improve security?
Open an interactive chat with Bash
Why are standard scanning tools insufficient for custom exploits?