A. Automated scanning
Explanation:
Automated vulnerability scanning is the first step in identifying vulnerabilities across an environment. It systematically scans systems, networks, and applications for known security weaknesses, such as outdated software, misconfigurations, and missing patches.
It provides a broad and efficient assessment before deeper security evaluations like penetration testing or threat hunting.
Why Not the Other Options?
B. Penetration testing → Penetration testing is a hands-on, targeted attack simulation, usually conducted after identifying vulnerabilities to confirm their exploitability.
C. Threat hunting → This involves proactively searching for threats that have already bypassed defenses, not for general vulnerability discovery.
D. Log aggregation → Collecting and analyzing logs helps with incident response and monitoring, but it does not directly identify vulnerabilities.
E. Adversarial emulation → This simulates real-world attack techniques but is more advanced and comes after vulnerability identification.
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.SY0-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
test_arrow
2 months, 2 weeks ago