Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-89 Topic 5 Question 7 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 7
Topic #: 5
[All 212-89 Questions]

During the vulnerability assessment phase, the incident responders perform various

steps as below:

1. Run vulnerability scans using tools

2. Identify and prioritize vulnerabilities

3. Examine and evaluate physical security

4. Perform OSINT information gathering to validate the vulnerabilities

5. Apply business and technology context to scanner results

6. Check for misconfigurations and human errors

7. Create a vulnerability scan report

Identify the correct sequence of vulnerability assessment steps performed by the

incident responders.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Marcelle
1 months ago
Haha, imagine if the incident responders just randomly jumped around between the steps. 'Oh, let's do physical security, then check for misconfigurations, then maybe run a scan or two?' Sounds like a recipe for disaster.
upvoted 0 times
...
Lewis
2 months ago
I'm going with Option B. Gotta love a nice, linear progression of steps. Much easier to follow than some of these other convoluted sequences.
upvoted 0 times
Ma
4 days ago
Yeah, I agree. It's easier to follow a linear progression.
upvoted 0 times
...
Celeste
5 days ago
I think Option B makes the most sense too. It's straightforward.
upvoted 0 times
...
Merissa
5 days ago
I think Option B makes the most sense too. It's straightforward and logical.
upvoted 0 times
...
Desiree
6 days ago
Definitely, makes the process more organized.
upvoted 0 times
...
Darnell
9 days ago
I agree, it's easier to follow a linear sequence.
upvoted 0 times
...
Lashawnda
15 days ago
Yeah, it seems like a logical progression of steps.
upvoted 0 times
...
Lezlie
19 days ago
I think Option B is the right sequence.
upvoted 0 times
...
...
Terry
2 months ago
Wait, why are we checking physical security during a vulnerability assessment? That's a bit out of place, don't you think?
upvoted 0 times
...
Samira
2 months ago
Option B seems to be the correct sequence. Vulnerability scanning should come before identifying and prioritizing the vulnerabilities.
upvoted 0 times
Shawn
1 months ago
I agree, scanning should definitely come before prioritizing vulnerabilities.
upvoted 0 times
...
Azzie
1 months ago
I think option B is correct. Scanning first makes sense.
upvoted 0 times
...
...
Stevie
2 months ago
I see your point, but I still think A) makes more sense because it prioritizes vulnerabilities early on.
upvoted 0 times
...
Pamella
2 months ago
I disagree, I believe the correct sequence is B) 1-->3-->2-->4-->5-->6-->7.
upvoted 0 times
...
Stevie
2 months ago
I think the correct sequence is A) 3-->6-->1-->2-->5-->4-->7.
upvoted 0 times
...

Save Cancel