New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA CS0-003 Exam - Topic 6 Question 8 Discussion

Actual exam question for CompTIA's CS0-003 exam
Question #: 8
Topic #: 6
[All CS0-003 Questions]

A Chief Information Security Officer wants to map all the attack vectors that the company faces each day. Which of the following recommendations should the company align their security controls around?

Show Suggested Answer Hide Answer
Suggested Answer: D

The correct answer is D. MITRE ATT&CK.

MITRE ATT&CK is a framework that maps the tactics, techniques, and procedures (TTPs) of various threat actors and groups, based on real-world observations and data. MITRE ATT&CK can help a Chief Information Security Officer (CISO) to map all the attack vectors that the company faces each day, as well as to align their security controls around the most relevant and prevalent threats. MITRE ATT&CK can also help the CISO to assess the effectiveness and maturity of their security posture, as well as to identify and prioritize the gaps and improvements .

The other options are not the best recommendations for mapping all the attack vectors that the company faces each day. OSSTMM (Open Source Security Testing Methodology Manual) (A) is a methodology that provides guidelines and best practices for conducting security testing and auditing, but it does not map the TTPs of threat actors or groups. Diamond Model of Intrusion Analysis (B) is a model that analyzes the relationships and interactions between four elements of an intrusion: adversary, capability, infrastructure, and victim. The Diamond Model can help understand the characteristics and context of an intrusion, but it does not map the TTPs of threat actors or groups. OWASP (Open Web Application Security Project) is a project that provides resources and tools for improving the security of web applications, but it does not map the TTPs of threat actors or groups.


Contribute your Thoughts:

0/2000 characters
Lezlie
3 months ago
Surprised MITRE ATT&CK is so popular, is it really that effective?
upvoted 0 times
...
Lashawnda
3 months ago
Definitely leaning towards the Diamond Model for analysis.
upvoted 0 times
...
Galen
4 months ago
Really? I thought OSSTMM was more thorough for mapping.
upvoted 0 times
...
Sue
4 months ago
OWASP is great for web apps, but not comprehensive enough.
upvoted 0 times
...
Chau
4 months ago
I think MITRE ATT&CK is the best choice here.
upvoted 0 times
...
Selma
4 months ago
I think OSSTMM could be useful, but I recall that MITRE ATT&CK is more widely recognized for its detailed approach to various attack techniques.
upvoted 0 times
...
Peggie
4 months ago
OWASP is great for web application security, but I feel like it might not cover all attack vectors comprehensively.
upvoted 0 times
...
Margart
5 months ago
I'm not entirely sure, but I think the Diamond Model might be more focused on analyzing specific incidents rather than mapping daily attack vectors.
upvoted 0 times
...
Jessenia
5 months ago
I remember studying the MITRE ATT&CK framework; it seems like a solid choice for mapping attack vectors.
upvoted 0 times
...
Jutta
5 months ago
This seems like a straightforward question. I think the MITRE ATT&CK framework would be the best recommendation to map the company's attack vectors.SarahSmith: Hmm, I'm not too familiar with the different security frameworks mentioned here. I'll need to review the details of each one to determine which one would be the most appropriate for this scenario.MichaelBrown: The OWASP framework is a good option for web application security, but I'm not sure if that's the best fit for mapping all the company's attack vectors. I may need to research the other choices a bit more.EmilyJohnson: Based on the question, the MITRE ATT&CK framework seems like the most comprehensive recommendation to align the company's security controls around. It covers a wide range of attack techniques and tactics.
upvoted 0 times
...
Bong
5 months ago
The OWASP framework is a good option for web application security, but I'm not sure if that's the best fit for mapping all the company's attack vectors. I may need to research the other choices a bit more.
upvoted 0 times
...
Queen
5 months ago
Hmm, I'm not too familiar with the different security frameworks mentioned here. I'll need to review the details of each one to determine which one would be the most appropriate for this scenario.
upvoted 0 times
...
Margret
5 months ago
This seems like a straightforward question. I think the MITRE ATT&CK framework would be the best recommendation to map the company's attack vectors.
upvoted 0 times
...
Alberta
5 months ago
Based on the question, the MITRE ATT&CK framework seems like the most comprehensive recommendation to align the company's security controls around. It covers a wide range of attack techniques and tactics.
upvoted 0 times
...
Yuette
5 months ago
Hmm, I remember learning about how OSPF routers acknowledge LSAs, but I can't recall the specifics. I'll have to think this through carefully.
upvoted 0 times
...
Monte
5 months ago
This seems like a pretty straightforward question. I'm pretty confident I can handle this one.
upvoted 0 times
...
Norah
5 months ago
Hmm, I'm a bit unsure about the differences between the 'Explanation' and 'Explanation - Remark' fields. I'll need to review that part carefully.
upvoted 0 times
...

Save Cancel