Which of the following are the MOST important items for prioritizing fixes that should be included in the final report for a penetration test? (Choose two.)
A. The CVSS score of the finding and C. The vulnerability identifier. The CVSS score is important for providing an indication of the severity of the vulnerability and its potential impact. The vulnerability identifier is important for providing a way to cross reference the finding with other sources of information and for tracking the progress of remediation efforts.
The vulnerability identifier could be a CVE (Common Vulnerabilities and Exposures) number or a CWE (Common Weakness Enumeration) number. For example, the CVE for a vulnerability in Microsoft Windows is CVE-2019-1458.
This one almost got me. I even had a snarky comment prepped and everything. Since I typed it already im gonna let it loose:
Tester: "You have a vulnerability in your network!"
Client: "OMG! Where?"
Tester: *shrugs*
-The above scenario was brought to you by the "Pick B Gang"
But anyway, as FasterN8 points out, the key work here is "Prioritizing" fixes. A and C are the only ones that help in identifying which to address first. Rather than being a the part of the report that identifies the vulnerability itself.
Answer is A and C.
Actually upon thinking more on this Im gonna go back to A and B as the answer... depending on the location of the device you may not need to address it immediately. For example a vulnerability within a server that's within a LAN and on the other side of a firewall may be addressed after a a vulnerability in a server that is network facing! Thus you are PRIORITIZING the public server rather than the private one.
Its A and B!
A. The CVSS score of the finding
B. The network location of the vulnerable device
Explanation:
A. The CVSS score of the finding:
• The Common Vulnerability Scoring System (CVSS) score provides a standardized way to assess the severity of a vulnerability. Including the CVSS score helps prioritize fixes based on the risk and impact of the vulnerabilities, guiding the client on which issues need immediate attention.
B. The network location of the vulnerable device:
• The network location of the vulnerable device helps determine the potential impact and risk associated with the vulnerability. For instance, vulnerabilities on critical infrastructure or systems within sensitive segments of the network may need higher priority for remediation compared to those on less critical systems.
Read the question, and use basic critical thinking skills.
The question asks to prioritize fixes.
In order to prioritize ANYTHING IN ANY CONTEXT, you need two things:
1) a list of WHAT ITEMS you must prioritize, and
2) a method to QUANTIFY each item on the list
A. The CVSS score of the finding [QUANTIFY]
C. The vulnerability identifier [WHAT ITEMS]
It seems to me that the vulnerability score and location should be a priority. I can see the argument for the vuln identifier but it is pointless to have it without knowing wich machine is afected. You could have a 5000 machine network and without the vulnerable machine address all is for nothing.
I agree with AB. I think C is important for remediation but prioritizing fixes involves finding out critical assets and where they are located. You can have a list of CVEs with corresponding CVSS scores and still find yourself wondering where to start.
AB: The need for the score should be evident but it's also important to know WHERE the weakness resides, e.g. behind a firewall or accessible over the internet
A. The CVSS score of the finding
B. The network location of the vulnerable device
I am starting to notice that multiple selections like this are always together....
The other options, B, D, E, and F, may have some relevance in the context of the penetration test, but they are not directly related to prioritizing fixes for the identified vulnerabilities.
A and B
Explanation "Exposure of the Vulnerability Cybersecurity analysts should also consider how exposed the vulnerability is to potential exploitation. For example, if an internal server has a serious SQL injection vulnerability but that server is only accessible from internal networks, remediating that issue may take a lower priority than remediating a less severe issue that is exposed to the Internet and, therefore, more vulnerable to external attack."
i check this link
idont know
A or C 80%
A or F 95%
I will go with A & F
https://cobalt.io/blog/how-to-write-an-effective-pentest-report-vulnerability-reports
This section is not available anymore. Please use the main Exam Page.PT0-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
RRabbit_111
Highly Voted 2 years, 3 months agoRRabbit_111
2 years, 3 months agohitagitore
Most Recent 2 months, 4 weeks agothroughthefray
5 months, 3 weeks agothroughthefray
5 months, 3 weeks agohitagitore
3 months, 3 weeks agofuzzyguzzy
8 months, 1 week agoFasterN8
9 months, 3 weeks agoFasterN8
9 months, 3 weeks agoEtc_Shadow28000
9 months, 4 weeks agoPMann
1 year, 1 month agosurfuganda
1 year, 1 month agoKeToopStudy
1 year, 3 months agodeeden
1 year, 1 month agoDanJia
1 year, 4 months agolordguck
1 year, 4 months agoTiredOfTests
1 year, 6 months agosolutionz
1 year, 8 months agoRAMI_PAL
1 year, 10 months agoKingIT_ENG
2 years, 1 month agoKingIT_ENG
2 years, 1 month ago[Removed]
2 years, 1 month ago