exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 25 discussion

Actual exam question from Cisco's 200-201
Question #: 25
Topic #: 1
[All 200-201 Questions]

What is a purpose of a vulnerability management framework?

  • A. identifies, removes, and mitigates system vulnerabilities
  • B. detects and removes vulnerabilities in source code
  • C. conducts vulnerability scans on the network
  • D. manages a list of reported vulnerabilities
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Leo_Visser
Highly Voted 3 years, 10 months ago
"Vulnerability management is the "cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating" software vulnerabilities.[1] Vulnerability management is integral to computer security and network security, and must not be confused with Vulnerability assessment" source: https://en.wikipedia.org/wiki/Vulnerability_management So A is the correct answer
upvoted 13 times
...
KYHO
Most Recent 6 months, 3 weeks ago
The correct answer is A. Attack vector refers to the path or means by which the attack is delivered <---
upvoted 1 times
...
ashlea
7 months ago
Selected Answer: A
A is the correct answer
upvoted 1 times
...
WISDOM2080
1 year, 7 months ago
A. identifies, removes, and mitigates system vulnerabilities
upvoted 1 times
...
sh4dali
2 years, 10 months ago
Vulnerability management is the process of identifying, analyzing, prioritizing, and remediating vulnerabilities in software and hardware.
upvoted 1 times
...
halamah
3 years, 5 months ago
a is correct vulnerability management is internet exposed devices
upvoted 1 times
...
eggheadsv
3 years, 5 months ago
What is a vulnerability management framework? What is a vulnerability management program framework? ... Vulnerability management programs address today's modern cybersecurity challenges by instituting a comprehensive and continuous process for identifying, classifying, remediating, and mitigating vulnerabilities before attackers can take advantage of them. So A is the correct answer
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago