Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

CREST Practitioner Threat Intelligence Analyst CPTIA Question # 30 Topic 4 Discussion

CREST Practitioner Threat Intelligence Analyst CPTIA Question # 30 Topic 4 Discussion

CPTIA Exam Topic 4 Question 30 Discussion:
Question #: 30
Topic #: 4

During the vulnerability assessment phase, the incident responders perform various

steps as below:

1. Run vulnerability scans using tools

2. Identify and prioritize vulnerabilities

3. Examine and evaluate physical security

4. Perform OSINT information gathering to validate the vulnerabilities

5. Apply business and technology context to scanner results

6. Check for misconfigurations and human errors

7. Create a vulnerability scan report

Identify the correct sequence of vulnerability assessment steps performed by the

incident responders.


A.

3-->6-->1-->2-->5-->4-->7


B.

1-->3-->2-->4-->5-->6-->7


C.

4-->1-->2-->3-->6-->5-->7


D.

2-->1-->4-->7-->5-->6-->3


Get Premium CPTIA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.