A network administrator received a report stating a critical vulnerability was detected on an application that is exposed to the internet. Which of the following is the appropriate NEXT step?
A.
Check for the existence of a known exploit in order to assess the risk.
B.
Immediately shut down the vulnerable application server.
C.
Install a network access control agent on the server.
The appropriate next step in this situation would be to check for the existence of a known exploit in order to assess the risk. This is important because it will help the network administrator determine the severity of the vulnerability and the potential impact it could have on the organization.
Once the network administrator has assessed the risk, they can then take appropriate action to address the vulnerability. This might include patching the application, deploying a new server to host the application, or implementing other security measures to mitigate the risk. It is generally not advisable to immediately shut down the vulnerable application server, as this could disrupt business operations and cause significant downtime. Similarly, installing a network access control agent on the server may not be the most effective solution, as it would not address the underlying vulnerability.
If someone gives an detailed answer, let he do it. We all are here to learn, and you certainly know Comptia is very sneaky when it comes to there exams. They will try to catch you off guard by all means. So lets all be friends and help each other out please...
Installing a network access control agent may provide additional security, but it does not address the immediate issue of the critical vulnerability and would not be the appropriate next step without first evaluating the risk and determining the cause of the vulnerability.
Shutting down the vulnerable application server may provide a temporary solution, but it does not address the root cause of the vulnerability and could impact business operations. Deploying a new server may be a long-term solution, but it also does not address the immediate issue of the critical vulnerability and would not be the appropriate first step.
In my opinion answer A is correct. NOW, maybe instead of questioning my answer you will choose correct answer and explain us why is it correct for you hm?
as much as people shit on jake his response aren't wrong. He's giving real world answers to solve the problem. the problem is the comptia does not like to use real world answer. So my advice is take comptia guide as a grain of salt cause alot the practices comptia wants you to do isnt done in the real world, coming from someone in the IT field.
please correct me if im wrong. Network control access is to restrict access of devices and users and not application.
Remaining answers dont make sense, thus A is the answer.
I think A makes sense. For what it's worth, Messer says best practice is to gather information about the system configuration before you start making changes. Maybe the vulnerability being "critical" changes the answer, but I'm going with A.
NAC is one aspect of network security. It provides visibility into the devices and users trying to access the enterprise network. And it controls who can access the network, including denying access to those users and devices that don't comply with security policies.
Its A because according to the Troubleshooting theory you have to first establish and verify that there is a problem. In this case there was only a report received. So first all the information gathering has to be done, then a theory of probable causes is to be established and tested, after which a plan of action is to be formulated and ONLY then an action is taken. Options B, C and D are all mitigation actions which is the step 4 and the question is still at Step 1.
correct answer is A, you need to find out what the exploit could be and if it's a known exploit then it's easier to resolve. If it's known then there is probably a solution that has already been created.
Is the real answer A or C? If the real answer is A then why is C marked as the answer? This is confusing. . . .So if I got this question on the exam, I should mark the answer as C? wow
Very subjective question although the answer is definitely A
It depends on the vulnerability. I might immediately take it offline depending on the risk
A for our homie Jake.
also.... its A cuz this will help prevent attackers from exploiting the vulnerability to compromise the application or the underlying system.
This section is not available anymore. Please use the main Exam Page.N10-008 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
JakeCharles
Highly Voted 2 years, 7 months agoBermet
2 years, 5 months agoireallyliketony
2 years, 6 months agoEumousten
2 years, 3 months agoJakeCharles
2 years, 5 months agoJakeCharles
2 years, 5 months agoJakeCharles
2 years, 5 months agoYomoma
2 years, 5 months agocoolwhip
2 years, 1 month agoJB1705
Most Recent 1 year agosuperzeke
1 year, 5 months agoMehsotopes
1 year, 7 months agoAsadArif
1 year, 8 months agoSizzle668
1 year, 9 months agoJuliana1017
1 year, 11 months agoNabski76
2 years agodrsam
2 years, 1 month agoAtomic_geek
2 years, 2 months agofamco
2 years, 2 months agoStellarSteve
2 years, 3 months agoMelzTheArtist
2 years, 5 months ago