Which step in the Vulnerability Management Life Cycle performs inventory of all assets across the network and identifies host details, including operating system and open services?
- Assess
- Discover
- Remediate
- Prioritize assets
Explanation: The steps in the Vulnerability Management Life Cycle include these:
- Discover - inventory all assets across the network and identify host details, including operating systems and open services to identify vulnerabilities
- Prioritize assets - categorize assets into groups or business units, and assign a business value to asset groups based on their criticality to business operations
- Assess - determine a baseline risk profile to eliminate risks based on asset criticality, vulnerability threats, and asset classification
- Report - measure the level of business risk associated with your assets according to your security policies. Document a security plan, monitor suspicious activity, and describe known vulnerabilities
- Remediate - prioritize according to business risk and fix vulnerabilities in order of risk
- Verify - verify that threats have been eliminated through follow-up audits
Exam with this question: CCNA Cyber Ops Chapter 10 Exam Answers
Exam with this question: CyberOps Associate (Version 1.0) - Module 23: Endpoint Vulnerability Quiz Answers
Exam with this question: Cyber Threat Management (CyberTM) Course Final Exam Answers
Exam with this question: Cyber Threat Management: My Knowledge Check Answers
Please login or Register to submit your answer