exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 325 discussion

Actual exam question from CompTIA's SY0-701
Question #: 325
Topic #: 1
[All SY0-701 Questions]

Which of the following activities are associated with vulnerability management? (Choose two.)

  • A. Reporting
  • B. Prioritization
  • C. Exploiting
  • D. Correlation
  • E. Containment
  • F. Tabletop exercise
Show Suggested Answer Hide Answer
Suggested Answer: AB 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
iliecomptia
1 week, 2 days ago
Selected Answer: AB
From the study guide: A: Vulnerability reporting is a crucial aspect of vulnerability management and is critical in maintaining an organization’s cybersecurity posture. (page 247) B: Vulnerability analysis helps prioritize remediation efforts by identifying the most critical vulnerabilities that pose the most significant risk to an organization. Prioritization is typically based on factors such as the severity of the vulnerability, the ease of exploitation, and the potential impact of an attack. Prioritizing vulnerabilities helps an organization focus limited resources on addressing the most significant threats first. (page 245) For those who say D is an answer, in the “Vulnerability Response and Remediation” section of the study guide there is no mention of containment.
upvoted 2 times
...
laternak26
2 weeks, 2 days ago
Selected Answer: AB
A. Reporting: Regularly documenting and reporting on vulnerabilities, including their status, potential risks, and the actions taken to remediate them, is a core part of the vulnerability management process. This helps to track progress and ensure that vulnerabilities are addressed in a timely manner. B. Prioritization: Given that not all vulnerabilities are equally critical, prioritizing them based on factors like the severity of the vulnerability, the risk to the organization, and the potential impact is essential. This helps to allocate resources efficiently and address the most pressing vulnerabilities first NOT E. Containment. Containment is an activity typically associated with incident response or a breach management process. While related to managing security risks, containment is not specifically a part of vulnerability management, which focuses more on identifying, assessing, and mitigating vulnerabilities.
upvoted 3 times
...
Fagann
2 weeks, 2 days ago
Selected Answer: AB
you would not contain a vulnerability. Containment is for isolating infected devices from the network and it is in incident response process.
upvoted 2 times
...
4617f0b
1 month ago
Selected Answer: BD
Why the other options are not correct according to ChatGPT: A. Reporting: While reporting is important, it is not a core activity of vulnerability management itself but rather an activity associated with tracking and communicating the process. C. Exploiting: Exploiting is not a part of vulnerability management. The goal of vulnerability management is to identify, assess, and mitigate vulnerabilities, not to exploit them. E. Containment: Containment is typically associated with incident response, where you contain the impact of a security breach or attack, not directly with vulnerability management. F. Tabletop exercise: Tabletop exercises are used to practice responses to security incidents, such as breaches or attacks, and are not part of vulnerability management.
upvoted 1 times
...
AndyK2
1 month ago
Selected Answer: AB
The selected activities (reporting and prioritization) are fundamental to effective vulnerability management, helping organizations systematically address potential security weaknesses.
upvoted 2 times
...
Cocopqr
1 month ago
Selected Answer: BE
B. Prioritization and E. Containment Here's a breakdown of why: Prioritization: This involves assessing the severity of vulnerabilities and prioritizing which ones to address first. This ensures that the most critical vulnerabilities are addressed promptly. Containment: This involves isolating or mitigating the impact of a vulnerability to prevent further damage. This might include patching systems, blocking network traffic, or quarantining infected devices. The other options are not directly related to vulnerability management: Reporting: While reporting vulnerabilities is important, it's not a core activity of vulnerability management. Exploiting: This is an action performed by attackers, not vulnerability managers. Correlation: This is related to threat intelligence and incident response, not vulnerability management. Tabletop exercise: These are used for training and planning, but not directly for vulnerability management.
upvoted 1 times
...
Cloudboy
1 month, 2 weeks ago
A and B
upvoted 1 times
...
3b6be6b
1 month, 2 weeks ago
A. Reporting: Communicating the identified vulnerabilities, their potential impact, and remediation steps to stakeholders. B. Prioritization: Determining which vulnerabilities to address first based on their severity, exploitability, and potential impact on the organization.
upvoted 1 times
...
jacobtriestech
1 month, 3 weeks ago
B and E Prioritization: This involves assessing the severity of identified vulnerabilities and ranking them based on factors like potential impact and likelihood of exploitation. It helps organizations focus on the most critical vulnerabilities first. Containment: This refers to actions taken to limit the spread and impact of a vulnerability, especially if it has been exploited. This might involve isolating affected systems, blocking network traffic, or implementing emergency patches.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago