CREST Practitioner Threat Intelligence Analyst CPTIA Question # 30 Topic 4 Discussion

CREST Practitioner Threat Intelligence Analyst CPTIA Question # 30 Topic 4 Discussion

CPTIA Exam Topic 4 Question 30 Discussion:
Question #: 30
Topic #: 4

During the vulnerability assessment phase, the incident responders perform various

steps as below:

1. Run vulnerability scans using tools

2. Identify and prioritize vulnerabilities

3. Examine and evaluate physical security

4. Perform OSINT information gathering to validate the vulnerabilities

5. Apply business and technology context to scanner results

6. Check for misconfigurations and human errors

7. Create a vulnerability scan report

Identify the correct sequence of vulnerability assessment steps performed by the

incident responders.


A.

3-->6-->1-->2-->5-->4-->7


B.

1-->3-->2-->4-->5-->6-->7


C.

4-->1-->2-->3-->6-->5-->7


D.

2-->1-->4-->7-->5-->6-->3


Get Premium CPTIA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.