exam questions

Exam 312-38 All Questions

View all questions & answers for the 312-38 exam

Exam 312-38 topic 1 question 425 discussion

Actual exam question from ECCouncil's 312-38
Question #: 425
Topic #: 1
[All 312-38 Questions]

John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a __________ and it has to adhere to the __________.

  • A. Mitigation, Security policies
  • B. Verification, Security Policies
  • C. Vulnerability scanning, Risk Analysis
  • D. Risk analysis, Risk matrix
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
alvaroestebancta
Highly Voted 2 years, 3 months ago
correct is B B. Verification, Security Policies
upvoted 6 times
...
ui
Highly Voted 2 years, 8 months ago
Verification Perform another scan to ensure the vulnerability is fixed after the remediation process Verifying
upvoted 5 times
...
ethacker
Most Recent 8 months, 1 week ago
Selected Answer: B
Answer is B, CND Book P.2245
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...