exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 161 discussion

Actual exam question from CompTIA's N10-008
Question #: 161
Topic #: 1
[All N10-008 Questions]

Which of the following is conducted frequently to maintain an updated list of a system's weaknesses?

  • A. Penetration test
  • B. Posture assessment
  • C. Risk assessment
  • D. Vulnerability scan
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
JakeCharles
Highly Voted 1 year, 3 months ago
Selected Answer: D
A vulnerability scan is conducted frequently to maintain an updated list of a system's weaknesses. A vulnerability scan is an automated process that checks a system or network for known vulnerabilities, such as outdated software versions, misconfigured settings, and unpatched systems. It checks the system against a database of known vulnerabilities and generates a report of any weaknesses that are found. This process is usually done periodically, such as weekly or monthly, to ensure that the system stays up-to-date with the latest patches and security updates.
upvoted 11 times
...
kungfuseven
Highly Voted 1 year, 4 months ago
D: Vulnerability scanning, also commonly known as ‘vuln scan,' is an automated process of proactively identifying network, application, and security vulnerabilities. Vulnerability scanning is typically performed by the IT department of an organization or a third-party security service provider. This scan is also performed by attackers who try to find points of entry into your network.
upvoted 5 times
...
Mehsotopes
Most Recent 5 months, 3 weeks ago
Selected Answer: D
A vulnerability scan is an automated, high-level test that looks for and reports potential vulnerabilities. A penetration test is a detailed hands-on examination by a real person that tries to detect and exploit weaknesses in your system. https://www.securitymetrics.com/blog/pentesting-vs-vulnerability-scanning-whats-difference#:~:text=A%20vulnerability%20scan%20is%20an,exploit%20weaknesses%20in%20your%20system.
upvoted 2 times
...
osmaster
6 months, 2 weeks ago
Selected Answer: D
GPT says that a vulnerability scan is conducted frequently to maintain an updated list of a system's weaknesses. Vulnerability scanning is an automated process that identifies and assesses vulnerabilities in a system or network. It involves the use of scanning tools and software to discover and report on potential security issues. This process is typically performed regularly to ensure that an organization is aware of any new vulnerabilities that may have emerged and to maintain an up-to-date list of weaknesses that need to be addressed.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago