Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-89 Topic 5 Question 7 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 7
Topic #: 5
[All 212-89 Questions]

During the vulnerability assessment phase, the incident responders perform various

steps as below:

1. Run vulnerability scans using tools

2. Identify and prioritize vulnerabilities

3. Examine and evaluate physical security

4. Perform OSINT information gathering to validate the vulnerabilities

5. Apply business and technology context to scanner results

6. Check for misconfigurations and human errors

7. Create a vulnerability scan report

Identify the correct sequence of vulnerability assessment steps performed by the

incident responders.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Marcelle
2 months ago
Haha, imagine if the incident responders just randomly jumped around between the steps. 'Oh, let's do physical security, then check for misconfigurations, then maybe run a scan or two?' Sounds like a recipe for disaster.
upvoted 0 times
Aleisha
13 days ago
C) 4-->1-->2-->3-->6-->5-->7 would definitely lead to confusion and inefficiency.
upvoted 0 times
...
Staci
14 days ago
B) 1-->3-->2-->4-->5-->6-->7 is the correct sequence to follow for a successful vulnerability assessment.
upvoted 0 times
...
Mose
15 days ago
A) 3-->6-->1-->2-->5-->4-->7 sounds like a much more organized approach.
upvoted 0 times
...
...
Lewis
2 months ago
I'm going with Option B. Gotta love a nice, linear progression of steps. Much easier to follow than some of these other convoluted sequences.
upvoted 0 times
Aretha
17 days ago
Definitely, it's important to have a logical sequence in vulnerability assessment.
upvoted 0 times
...
Glory
18 days ago
I prefer clear steps like Option B. It's more organized.
upvoted 0 times
...
Nelida
18 days ago
Yeah, Option B seems like the most efficient way to conduct a vulnerability assessment.
upvoted 0 times
...
Precious
19 days ago
I agree, following a linear progression of steps definitely helps in staying organized.
upvoted 0 times
...
Ma
23 days ago
Yeah, I agree. It's easier to follow a linear progression.
upvoted 0 times
...
Celeste
24 days ago
I think Option B makes the most sense too. It's straightforward.
upvoted 0 times
...
Merissa
24 days ago
I think Option B makes the most sense too. It's straightforward and logical.
upvoted 0 times
...
Desiree
25 days ago
Definitely, makes the process more organized.
upvoted 0 times
...
Darnell
28 days ago
I agree, it's easier to follow a linear sequence.
upvoted 0 times
...
Lashawnda
1 months ago
Yeah, it seems like a logical progression of steps.
upvoted 0 times
...
Lezlie
1 months ago
I think Option B is the right sequence.
upvoted 0 times
...
...
Terry
2 months ago
Wait, why are we checking physical security during a vulnerability assessment? That's a bit out of place, don't you think?
upvoted 0 times
...
Samira
3 months ago
Option B seems to be the correct sequence. Vulnerability scanning should come before identifying and prioritizing the vulnerabilities.
upvoted 0 times
Shawn
2 months ago
I agree, scanning should definitely come before prioritizing vulnerabilities.
upvoted 0 times
...
Azzie
2 months ago
I think option B is correct. Scanning first makes sense.
upvoted 0 times
...
...
Stevie
3 months ago
I see your point, but I still think A) makes more sense because it prioritizes vulnerabilities early on.
upvoted 0 times
...
Pamella
3 months ago
I disagree, I believe the correct sequence is B) 1-->3-->2-->4-->5-->6-->7.
upvoted 0 times
...
Stevie
3 months ago
I think the correct sequence is A) 3-->6-->1-->2-->5-->4-->7.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77