Q: 10
[Security Operations]
An organization found a significant vulnerability associated with a commonly used package in a
variety of operating systems. The organization develops a registry of software dependencies to
facilitate incident response activities. As part of the registry, the organization creates hashes of
packages that have been formally vetted. Which of the following attack vectors does this registry
address?
Options
Discussion
A. C is tempting but the registry with vetted hashes is really about stopping supply chain risk, not side channels.
Don't think it's B. Option C makes more sense to me here because side-channel analysis can look at how software interacts, and keeping hashes helps track changes. I saw similar advice in some official guides. Disagree?
I see why you'd think C but D looks closer to me since on-path attacks mess with data in transit, and verified hashes could catch tampering. Might be missing something here.
Be respectful. No spam.