Which step in the Vulnerability Management Life Cycle performs inventory of all assets across the network and identifies host details, including operating system and open services?

IT Questions BankCategory: CCNA CyberOpsWhich step in the Vulnerability Management Life Cycle performs inventory of all assets across the network and identifies host details, including operating system and open services?

Which step in the Vulnerability Management Life Cycle performs inventory of all assets across the network and identifies host details, including operating system and open services?

  • Assess
  • Discover
  • Remediate
  • Prioritize assets

Explanation: The steps in the Vulnerability Management Life Cycle include these:

  • Discover - inventory all assets across the network and identify host details, including operating systems and open services to identify vulnerabilities
  • Prioritize assets - categorize assets into groups or business units, and assign a business value to asset groups based on their criticality to business operations
  • Assess - determine a baseline risk profile to eliminate risks based on asset criticality, vulnerability threats, and asset classification
  • Report - measure the level of business risk associated with your assets according to your security policies. Document a security plan, monitor suspicious activity, and describe known vulnerabilities
  • Remediate - prioritize according to business risk and fix vulnerabilities in order of risk
  • Verify - verify that threats have been eliminated through follow-up audits

Exam with this question: CCNA Cyber Ops Chapter 10 Exam Answers
Exam with this question: CyberOps Associate (Version 1.0) - Module 23: Endpoint Vulnerability Quiz Answers
Exam with this question: Cyber Threat Management (CyberTM) Course Final Exam Answers
Exam with this question: Cyber Threat Management: My Knowledge Check Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments