exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 175 discussion

Actual exam question from CompTIA's PT0-002
Question #: 175
Topic #: 1
[All PT0-002 Questions]

Which of the following are the MOST important items for prioritizing fixes that should be included in the final report for a penetration test? (Choose two.)

  • A. The CVSS score of the finding
  • B. The network location of the vulnerable device
  • C. The vulnerability identifier
  • D. The client acceptance form
  • E. The name of the person who found the flaw
  • F. The tool used to find the issue
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RRabbit_111
Highly Voted 2 years, 3 months ago
Selected Answer: AC
A. The CVSS score of the finding and C. The vulnerability identifier. The CVSS score is important for providing an indication of the severity of the vulnerability and its potential impact. The vulnerability identifier is important for providing a way to cross reference the finding with other sources of information and for tracking the progress of remediation efforts.
upvoted 9 times
RRabbit_111
2 years, 3 months ago
The vulnerability identifier could be a CVE (Common Vulnerabilities and Exposures) number or a CWE (Common Weakness Enumeration) number. For example, the CVE for a vulnerability in Microsoft Windows is CVE-2019-1458.
upvoted 5 times
...
...
hitagitore
Most Recent 2 months, 4 weeks ago
Selected Answer: AB
A. how critical the vulnerability is. B. how critical the vulnerable server is. C. how to detect the vulnerability.
upvoted 1 times
...
throughthefray
5 months, 3 weeks ago
Selected Answer: AC
This one almost got me. I even had a snarky comment prepped and everything. Since I typed it already im gonna let it loose: Tester: "You have a vulnerability in your network!" Client: "OMG! Where?" Tester: *shrugs* -The above scenario was brought to you by the "Pick B Gang" But anyway, as FasterN8 points out, the key work here is "Prioritizing" fixes. A and C are the only ones that help in identifying which to address first. Rather than being a the part of the report that identifies the vulnerability itself. Answer is A and C.
upvoted 2 times
throughthefray
5 months, 3 weeks ago
Actually upon thinking more on this Im gonna go back to A and B as the answer... depending on the location of the device you may not need to address it immediately. For example a vulnerability within a server that's within a LAN and on the other side of a firewall may be addressed after a a vulnerability in a server that is network facing! Thus you are PRIORITIZING the public server rather than the private one. Its A and B!
upvoted 3 times
hitagitore
3 months, 3 weeks ago
agreed, vulnerability identifier or more commonly known as IOC will provide validation on the vulnerability, but it doesn't provide priority.
upvoted 1 times
...
...
...
fuzzyguzzy
8 months, 1 week ago
Selected Answer: AC
A & C give information about the vulnerability. B gives the location of the device, not the vulnerability.
upvoted 1 times
...
FasterN8
9 months, 3 weeks ago
Selected Answer: AB
A. (CVSS score) Provides a measure of severity without any context. B. (Network location) Provides company-relevant context for that vulnerability
upvoted 1 times
FasterN8
9 months, 3 weeks ago
C. (vulnerability Identifier) is needed for remediation, but A. and B. are needed for PRIORITIZATION.
upvoted 1 times
...
...
Etc_Shadow28000
9 months, 4 weeks ago
Selected Answer: AB
A. The CVSS score of the finding B. The network location of the vulnerable device Explanation: A. The CVSS score of the finding: • The Common Vulnerability Scoring System (CVSS) score provides a standardized way to assess the severity of a vulnerability. Including the CVSS score helps prioritize fixes based on the risk and impact of the vulnerabilities, guiding the client on which issues need immediate attention. B. The network location of the vulnerable device: • The network location of the vulnerable device helps determine the potential impact and risk associated with the vulnerability. For instance, vulnerabilities on critical infrastructure or systems within sensitive segments of the network may need higher priority for remediation compared to those on less critical systems.
upvoted 2 times
...
PMann
1 year, 1 month ago
AC- both seem to deal with priority. The score and network location to determine if it’s a critical vulnerability
upvoted 1 times
...
surfuganda
1 year, 1 month ago
Selected Answer: AC
Read the question, and use basic critical thinking skills. The question asks to prioritize fixes. In order to prioritize ANYTHING IN ANY CONTEXT, you need two things: 1) a list of WHAT ITEMS you must prioritize, and 2) a method to QUANTIFY each item on the list A. The CVSS score of the finding [QUANTIFY] C. The vulnerability identifier [WHAT ITEMS]
upvoted 1 times
...
KeToopStudy
1 year, 3 months ago
Selected Answer: AB
It seems to me that the vulnerability score and location should be a priority. I can see the argument for the vuln identifier but it is pointless to have it without knowing wich machine is afected. You could have a 5000 machine network and without the vulnerable machine address all is for nothing.
upvoted 3 times
deeden
1 year, 1 month ago
I agree with AB. I think C is important for remediation but prioritizing fixes involves finding out critical assets and where they are located. You can have a list of CVEs with corresponding CVSS scores and still find yourself wondering where to start.
upvoted 1 times
...
...
DanJia
1 year, 4 months ago
If you ever take the CySA+ test, it always remediates the external-facing devices first and then the internal ones based on the score. So A and B
upvoted 1 times
...
lordguck
1 year, 4 months ago
AB: The need for the score should be evident but it's also important to know WHERE the weakness resides, e.g. behind a firewall or accessible over the internet
upvoted 1 times
...
TiredOfTests
1 year, 6 months ago
Selected Answer: AB
A. The CVSS score of the finding B. The network location of the vulnerable device I am starting to notice that multiple selections like this are always together....
upvoted 2 times
...
solutionz
1 year, 8 months ago
Selected Answer: AC
The other options, B, D, E, and F, may have some relevance in the context of the penetration test, but they are not directly related to prioritizing fixes for the identified vulnerabilities.
upvoted 1 times
...
RAMI_PAL
1 year, 10 months ago
Selected Answer: AB
A and B Explanation "Exposure of the Vulnerability Cybersecurity analysts should also consider how exposed the vulnerability is to potential exploitation. For example, if an internal server has a serious SQL injection vulnerability but that server is only accessible from internal networks, remediating that issue may take a lower priority than remediating a less severe issue that is exposed to the Internet and, therefore, more vulnerable to external attack."
upvoted 2 times
...
KingIT_ENG
2 years, 1 month ago
i check this link idont know A or C 80% A or F 95% I will go with A & F https://cobalt.io/blog/how-to-write-an-effective-pentest-report-vulnerability-reports
upvoted 1 times
...
KingIT_ENG
2 years, 1 month ago
A and C is correct answer
upvoted 1 times
...
[Removed]
2 years, 1 month ago
A or C ithink is correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago