exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 333 discussion

Actual exam question from CompTIA's SY0-701
Question #: 333
Topic #: 1
[All SY0-701 Questions]

Which of the following is a risk of conducting a vulnerability assessment?

  • A. A disruption of business operations
  • B. Unauthorized access to the system
  • C. Reports of false positives
  • D. Finding security gaps in the system
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
fab34
Highly Voted 5 months, 2 weeks ago
Selected Answer: A
Its A because it asks specically for the RISK in a vunerability assessment. A False Positive is just a result of a vulnerability assessment.
upvoted 5 times
...
585402e
Most Recent 2 months, 1 week ago
Selected Answer: A
Having FP in your report does not constitute a risk as you will later evaluate the findings from the VA. On the other hand, VA can cause business disruption. A characteristic example is the VA that was performed on our company’s printers, which caused all the printer’s pages to be printed while the scanner was checking for Log4j vulnerabilities.
upvoted 2 times
...
9149f41
3 months, 1 week ago
Selected Answer: A
Some vulnerability scans may interrupt or block particular services; that's why the technician must inform the client before starting the scan.
upvoted 2 times
...
pindinga1
3 months, 3 weeks ago
Selected Answer: A
Its A because it asks specically for the RISK in a vunerability assessment. A False Positive is just a result of a vulnerability assessment.
upvoted 3 times
...
musaabokisec
4 months, 1 week ago
Selected Answer: A
GPT Conducting a vulnerability assessment involves scanning systems, applications, and networks to identify security weaknesses. Depending on the tools and techniques used, this process can sometimes inadvertently disrupt business operations by: Overloading systems with traffic during scans. Causing application crashes or service interruptions, especially if poorly configured or sensitive systems are involved. Triggering security defenses, such as intrusion prevention systems (IPS), that may block legitimate traffic or actions. While vulnerability assessments are essential for improving security, they carry the inherent risk of impacting the availability or performance of critical business services during the testing process.
upvoted 1 times
...
laternak26
4 months, 2 weeks ago
Selected Answer: C
NOT A disruption of business operations: Vulnerability assessments, when properly conducted, should not cause significant disruptions to business operations.
upvoted 4 times
...
AndyK2
5 months ago
Selected Answer: C
A false positive in a vulnerability assessment occurs when the assessment tool incorrectly identifies a security vulnerability that doesn't actually exist. This is a common risk in vulnerability assessments for several reasons: Vulnerability scanning tools can sometimes misinterpret system configurations or software characteristics Automated tools may not have perfect accuracy in detecting real security weaknesses A. A disruption of business operations: Vulnerability assessments are typically designed to minimize operational disruption and are usually conducted with minimal impact on ongoing business activities.
upvoted 2 times
...
3b6be6b
5 months, 2 weeks ago
Selected Answer: A
It may impact performance of the systems
upvoted 2 times
...
3b6be6b
5 months, 2 weeks ago
Selected Answer: A
A. A disruption of business operations: Conducting a vulnerability assessment involves scanning systems for weaknesses and potential security issues. Depending on the tools and techniques used, this process could inadvertently disrupt business operations. For example, some scans might consume significant system resources, cause performance degradation, or even trigger unintended issues like system crashes or downtime. This is a real risk of performing vulnerability assessments, especially in live or production environments.
upvoted 1 times
...
e157c7c
5 months, 3 weeks ago
Selected Answer: C
A vulnerability assessment is unlikely to cause a disruption of business operations. It is far more likely to generate false positives. C.
upvoted 1 times
...
9ef4a35
5 months, 3 weeks ago
A. A disruption of business operations. Conducting a vulnerability assessment involves actively scanning and probing systems for weaknesses. This process can sometimes result in unintended consequences, such as: System instability. Network performance degradation. Disruption of critical business operations due to overly aggressive scanning. This makes disruption of business operations a key risk associated with vulnerability assessments.
upvoted 2 times
...
jacobtriestech
5 months, 3 weeks ago
Selected Answer: C
A vulnerability assessment is a process of identifying, classifying, and prioritizing vulnerabilities in a system. While it's a valuable security practice, it can sometimes lead to false positives, which are security alerts that incorrectly identify a threat.
upvoted 1 times
c7d159b
5 months, 3 weeks ago
false positives are likely to be ignored over time though, because it has no impact on the networks
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago