ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 35 Topic 4 Discussion

ECCouncil EC Council Certified Incident Handler (ECIH v3) 212-89 Question # 35 Topic 4 Discussion

212-89 Exam Topic 4 Question 35 Discussion:
Question #: 35
Topic #: 4

During the vulnerability assessment phase, the incident responders perform various

steps as below:

1. Run vulnerability scans using tools

2. Identify and prioritize vulnerabilities

3. Examine and evaluate physical security

4. Perform OSINT information gathering to validate the vulnerabilities

5. Apply business and technology context to scanner results

6. Check for misconfigurations and human errors

7. Create a vulnerability scan report

Identify the correct sequence of vulnerability assessment steps performed by the

incident responders.


A.

3-->6-->1-->2-->5-->4-->7


B.

1-->3-->2-->4-->5-->6-->7


C.

4-->1-->2-->3-->6-->5-->7


D.

2-->1-->4-->7-->5-->6-->3


Get Premium 212-89 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.