exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 22 discussion

Actual exam question from CompTIA's N10-008
Question #: 22
Topic #: 1
[All N10-008 Questions]

Which of the following is used to track and document various types of known vulnerabilities?

  • A. CVE
  • B. Penetration testing
  • C. Zero-day
  • D. SIEM
  • E. Least privilege
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
tomservo
Highly Voted 3 years, 3 months ago
Selected Answer: A
CVE is the acronym for Common Vulnerabilities and Exposures and the link to the website is posted by EpitomeOfSalt. I agree the answer is A. CVE
upvoted 13 times
...
[Removed]
Most Recent 8 months, 2 weeks ago
Selected Answer: A
Agree with A All questions answers (valid information) at harry.bard28 at outlook
upvoted 2 times
...
Jaeide__X
1 year, 2 months ago
Selected Answer: A
CVE (Common Vulnerabilities and Exposures) is a standardized list of common identifiers for publicly known cybersecurity vulnerabilities. Each CVE entry includes a unique identifier, a description of the vulnerability, and any applicable references or remediation information. CVE entries are widely used by cybersecurity professionals, organizations, and vendors to track, document, and communicate information about known vulnerabilities in software and hardware products.
upvoted 2 times
...
Mehsotopes
1 year, 6 months ago
Selected Answer: A
Common Vulnerability & Exposures provides a standard nomenclature for describing security related software flaws. Common Vulnerabilities and Exposures (CVE) is an element of the Security Content Automation Protocol (SCAP) that provides a standard nomenclature for describing security flaws or vulnerabilities. A Security Information Event Management (SIEM) is a solution that provides a real-time or near-real-time analysis of security alerts generated by network hardware and applications. A Virtual Private Cloud (VPC) is a private network segment made available to a single cloud consumer on a public cloud. The Sarbanes-Oxley Act (SOX) dictates requirements for storing and retaining documents relating to an organization's financial and business operations, including the type of documents stored and their retention periods.
upvoted 2 times
...
Bobbober12
2 years, 4 months ago
Selected Answer: A
Common Vulnerabilities and Exposures (CVE) process of elemination. https://cve.mitre.org/
upvoted 4 times
...
stonegg
3 years, 1 month ago
Selected Answer: A
Common Vulnerabilities and Exposures (CVE) on LO 4.4
upvoted 2 times
...
EpitomeOfSalt
3 years, 3 months ago
Selected Answer: A
Given answer is correct. https://cve.mitre.org/
upvoted 4 times
...
waqdhiyo
3 years, 3 months ago
Selected Answer: B
Penetration testing
upvoted 1 times
EpitomeOfSalt
3 years, 3 months ago
Its not pentesting
upvoted 11 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...