exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 292 discussion

Actual exam question from CompTIA's N10-008
Question #: 292
Topic #: 1
[All N10-008 Questions]

A network administrator received a report stating a critical vulnerability was detected on an application that is exposed to the internet. Which of the following is the appropriate NEXT step?

  • A. Check for the existence of a known exploit in order to assess the risk.
  • B. Immediately shut down the vulnerable application server.
  • C. Install a network access control agent on the server.
  • D. Deploy a new server to host the application.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
JakeCharles
Highly Voted 2 years, 7 months ago
Selected Answer: A
The appropriate next step in this situation would be to check for the existence of a known exploit in order to assess the risk. This is important because it will help the network administrator determine the severity of the vulnerability and the potential impact it could have on the organization. Once the network administrator has assessed the risk, they can then take appropriate action to address the vulnerability. This might include patching the application, deploying a new server to host the application, or implementing other security measures to mitigate the risk. It is generally not advisable to immediately shut down the vulnerable application server, as this could disrupt business operations and cause significant downtime. Similarly, installing a network access control agent on the server may not be the most effective solution, as it would not address the underlying vulnerability.
upvoted 16 times
Bermet
2 years, 5 months ago
Thank you
upvoted 1 times
...
ireallyliketony
2 years, 6 months ago
Once again, just copied and pasted from chatGPT.
upvoted 12 times
Eumousten
2 years, 3 months ago
If someone gives an detailed answer, let he do it. We all are here to learn, and you certainly know Comptia is very sneaky when it comes to there exams. They will try to catch you off guard by all means. So lets all be friends and help each other out please...
upvoted 19 times
...
JakeCharles
2 years, 5 months ago
the other answers simply doesn't make any sense my friend.
upvoted 3 times
JakeCharles
2 years, 5 months ago
Installing a network access control agent may provide additional security, but it does not address the immediate issue of the critical vulnerability and would not be the appropriate next step without first evaluating the risk and determining the cause of the vulnerability. Shutting down the vulnerable application server may provide a temporary solution, but it does not address the root cause of the vulnerability and could impact business operations. Deploying a new server may be a long-term solution, but it also does not address the immediate issue of the critical vulnerability and would not be the appropriate first step.
upvoted 3 times
JakeCharles
2 years, 5 months ago
In my opinion answer A is correct. NOW, maybe instead of questioning my answer you will choose correct answer and explain us why is it correct for you hm?
upvoted 3 times
Yomoma
2 years, 5 months ago
as much as people shit on jake his response aren't wrong. He's giving real world answers to solve the problem. the problem is the comptia does not like to use real world answer. So my advice is take comptia guide as a grain of salt cause alot the practices comptia wants you to do isnt done in the real world, coming from someone in the IT field.
upvoted 6 times
...
...
...
...
coolwhip
2 years, 1 month ago
Not from ChatGPT. That is copied and pasted from vceUP.
upvoted 1 times
...
...
...
JB1705
Most Recent 1 year ago
Selected Answer: A
please correct me if im wrong. Network control access is to restrict access of devices and users and not application. Remaining answers dont make sense, thus A is the answer.
upvoted 1 times
...
superzeke
1 year, 5 months ago
I think A makes sense. For what it's worth, Messer says best practice is to gather information about the system configuration before you start making changes. Maybe the vulnerability being "critical" changes the answer, but I'm going with A.
upvoted 1 times
...
Mehsotopes
1 year, 7 months ago
Selected Answer: C
NAC is one aspect of network security. It provides visibility into the devices and users trying to access the enterprise network. And it controls who can access the network, including denying access to those users and devices that don't comply with security policies.
upvoted 2 times
...
AsadArif
1 year, 8 months ago
Selected Answer: A
Its A because according to the Troubleshooting theory you have to first establish and verify that there is a problem. In this case there was only a report received. So first all the information gathering has to be done, then a theory of probable causes is to be established and tested, after which a plan of action is to be formulated and ONLY then an action is taken. Options B, C and D are all mitigation actions which is the step 4 and the question is still at Step 1.
upvoted 2 times
...
Sizzle668
1 year, 9 months ago
B seems the most logical and once that's done A
upvoted 1 times
...
Juliana1017
1 year, 11 months ago
Selected Answer: A
correct answer is A, you need to find out what the exploit could be and if it's a known exploit then it's easier to resolve. If it's known then there is probably a solution that has already been created.
upvoted 2 times
...
Nabski76
2 years ago
do we have to approach the exam thinking the Comptia way? or go with the correct answer?
upvoted 1 times
...
drsam
2 years, 1 month ago
May the "critically" cause the answer to be C instead of A?
upvoted 1 times
...
Atomic_geek
2 years, 2 months ago
Is the real answer A or C? If the real answer is A then why is C marked as the answer? This is confusing. . . .So if I got this question on the exam, I should mark the answer as C? wow
upvoted 1 times
...
famco
2 years, 2 months ago
Very subjective question although the answer is definitely A It depends on the vulnerability. I might immediately take it offline depending on the risk
upvoted 2 times
...
StellarSteve
2 years, 3 months ago
Selected Answer: A
A for our homie Jake. also.... its A cuz this will help prevent attackers from exploiting the vulnerability to compromise the application or the underlying system.
upvoted 4 times
...
MelzTheArtist
2 years, 5 months ago
Selected Answer: A
answer is A
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...