• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

When a penetration test identifies a vulnerability, how should the vulnerability be further verified?

  • determine if the vulnerability is exploitable 
  • prioritize the vulnerability severity 
  • assess the business risk associated with the vulnerability 
  • mitigate the vulnerability

Explanation & Hint:

If a detected vulnerability can be exploited, it is verified as valid. The vulnerability should then be prioritized, mitigated, and risk assessed.

For more Questions and Answers:

3.5.3 Quiz – Information Gathering and Vulnerability Scanning Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments