exam questions

Exam PT1-002 All Questions

View all questions & answers for the PT1-002 exam

Exam PT1-002 topic 1 question 68 discussion

Actual exam question from CompTIA's PT1-002
Question #: 68
Topic #: 1
[All PT1-002 Questions]

Which of the following are the MOST important items to include in the final report for a penetration test? (Choose two.)

  • A. The CVSS score of the finding
  • B. The network location of the vulnerable device
  • C. The vulnerability identifier
  • D. The client acceptance form
  • E. The name of the person who found the flaw
  • F. The tool used to find the issue
Show Suggested Answer Hide Answer
Suggested Answer: BC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Setsunarcangel
Highly Voted 3 years ago
Selected Answer: BC
In Comptia certmaster states: Conclusion: This section wraps up the report. It should include a general summary statement about failures and successes, with supporting evidence that can be written in a sentence or two. It should also include a statement of the PenTest goals and whether those goals were met. You can get more specific about potential attacks and what assets such an attack could leverage. Identify the areas that are most likely to be compromised and recommend that those be dealt with as soon as possible.
upvoted 9 times
...
Davar39
Highly Voted 3 years, 3 months ago
Selected Answer: AF
I will go with A & F https://cobalt.io/blog/how-to-write-an-effective-pentest-report-vulnerability-reports
upvoted 6 times
...
bieecop
Most Recent 1 year, 9 months ago
Selected Answer: AC
Including the vulnerability identifier is crucial for clear identification and reference of the specific vulnerabilities discovered during the penetration test. This helps the client and other stakeholders easily understand and track the identified issues. Including the CVSS (Common Vulnerability Scoring System) score of the findings provides an objective measure of the severity and potential impact of the vulnerabilities. This scoring system allows the client to prioritize and address the identified vulnerabilities based on their severity levels.
upvoted 1 times
...
Yazed
2 years, 1 month ago
Selected Answer: CF
I think
upvoted 1 times
...
lifehacker0777
2 years, 1 month ago
Selected Answer: AC
A. The CVSS score of the finding and C. The vulnerability identifier. The CVSS score is important for providing an indication of the severity of the vulnerability and its potential impact. The vulnerability identifier is important for providing a way to cross reference the finding with other sources of information and for tracking the progress of remediation efforts.
upvoted 2 times
RHER
2 years, 1 month ago
CONCUERDO CONTIGO ES A Y C
upvoted 1 times
...
...
TheITStudent
2 years, 9 months ago
Selected Answer: BC
I agree with @Setsunarcangel..... why would it matter what tools were used to find the vulnerabilities guys? Companies don't care if you used nmap or angry ip-scanner...? All they care is what is the vulnerability, where is it, how do we fix it, etc. D, E, F ARE OUT right off the bat. A, B, C, are left. A, the CVSS score, is not helpful with only the score, the CVE will be helpful, and will include CVSS score, but CVSS score alone will not help them to remediate, they need to IDENTIFY the vulnerability WHAT and WHERE.
upvoted 2 times
...
carlo479
3 years ago
I think it should be B and F
upvoted 2 times
...
BinarySoldier
3 years, 5 months ago
I would go with A and F on this one.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago