ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 322 - N10-008 discussion

Report
Export

A network administrator received a report staling a critical vulnerability was detected on an application that is exposed to the internet. Which of the following Is the appropriate NEXT step?

A.
Check for the existence of a known exploit in order to assess the risk
Answers
A.
Check for the existence of a known exploit in order to assess the risk
B.
Immediately shut down the vulnerable application server.
Answers
B.
Immediately shut down the vulnerable application server.
C.
Install a network access control agent on the server.
Answers
C.
Install a network access control agent on the server.
D.
Deploy a new server to host the application.
Answers
D.
Deploy a new server to host the application.
Suggested answer: A

Explanation:

The appropriate next step in this situation would be to check for the existence of a known exploit in order to assess the risk. This is important because it will help the network administrator determine the severity of the vulnerability and the potential impact it could have on the organization. Once the network administrator has assessed the risk, they can then take appropriate action to address the vulnerability. This might include patching the application, deploying a new server to host the application, or implementing other security measures to mitigate the risk. It is generally not advisable to immediately shut down the vulnerable application server, as this could disrupt business operations and cause significant downtime. Similarly, installing a network access control agent on the server may not be the most effective solution, as it would not address the underlying vulnerability.

asked 02/10/2024
Jeremiah Hutchins
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first