Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 172 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 172
Topic #: 1
[All 312-50v12 Questions]

An IT company has just implemented new security controls to their network and system setup. As a Certified Ethical Hacker, your responsibility is to assess the possible vulnerabilities in the new setup. You are given the information that the network and system are adequately patched with the latest updates, and all employees have gone through recent cybersecurity awareness training. Considering the potential vulnerability sources, what is the best initial approach to vulnerability assessment?

  • A. Conducting social engineering tests to check if employees can be tricked into revealing sensitive information
  • B. Checking for hardware and software misconfigurations to identify any possible loopholes
  • C. Evaluating the network for inherent technology weaknesses prone to specific types of attacks
  • D. Investigating if any ex-employees still have access to the company's system and data
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
GK2205
4 months ago
Selected Answer: B
The key to this question is "Best .. initial ..."
upvoted 1 times
...
LordXander
8 months ago
Selected Answer: B
It's B because misconfiguration still can occur after proper pathing and training
upvoted 2 times
...
qtygbapjpesdayazko
8 months ago
Selected Answer: B
Keyword "new setup". Checking for hardware and software misconfigurations to identify any possible loopholes
upvoted 2 times
...
brrbrr
9 months ago
Selected Answer: C
Given that the network and system are adequately patched, and employees have undergone recent cybersecurity awareness training, the best initial approach to vulnerability assessment would likely be: C. Evaluating the network for inherent technology weaknesses prone to specific types of attacks. While all the options are important aspects of a comprehensive vulnerability assessment, evaluating the network for inherent technology weaknesses helps identify potential vulnerabilities that may exist due to the configuration, design, or technology choices. This involves assessing the network for weaknesses that could be exploited by attackers, such as insecure protocols, open ports, or default configurations that may pose security risks. This step complements the information about the latest updates and cybersecurity awareness training by focusing on the technical aspects of the network's security posture.
upvoted 1 times
brrbrr
9 months ago
actually, B is the correct answer.
upvoted 3 times
...
athicalacker
9 months ago
The question mentions adequate patching, suggesting these weaknesses are likely addressed. So it can't be C. The answer is option B. Even with patches and training, misconfigurations can introduce vulnerabilities. Checking for them first allows you to identify and address fundamental flaws before proceeding to more advanced testing.
upvoted 3 times
...
...
insaniunt
9 months, 2 weeks ago
Selected Answer: B
B. Checking for hardware and software misconfigurations to identify any possible loopholes
upvoted 2 times
...
cloudgangster
9 months, 3 weeks ago
Selected Answer: B
I'm not sure but i think B
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...