Exam N10-008 All QuestionsBrowse all questions from this exam
Question 292

A network administrator received a report stating a critical vulnerability was detected on an application that is exposed to the internet. Which of the following is the appropriate NEXT step?

    Correct Answer: A

    When a critical vulnerability is detected on an application exposed to the internet, the appropriate next step is to check for the existence of a known exploit to assess the risk. By understanding the exploitability of the vulnerability, the network administrator can determine the severity and potential impact on the system. This information is crucial for deciding the most effective course of action to mitigate the risk, which might include patching the vulnerability, implementing security measures, or other actions. Immediate shutdown, installation of network access control, or deploying a new server are actions that would follow an initial risk assessment to ensure they are necessary and appropriate responses.

Discussion
JakeCharlesOption: A

The appropriate next step in this situation would be to check for the existence of a known exploit in order to assess the risk. This is important because it will help the network administrator determine the severity of the vulnerability and the potential impact it could have on the organization. Once the network administrator has assessed the risk, they can then take appropriate action to address the vulnerability. This might include patching the application, deploying a new server to host the application, or implementing other security measures to mitigate the risk. It is generally not advisable to immediately shut down the vulnerable application server, as this could disrupt business operations and cause significant downtime. Similarly, installing a network access control agent on the server may not be the most effective solution, as it would not address the underlying vulnerability.

ireallyliketony

Once again, just copied and pasted from chatGPT.

JakeCharles

the other answers simply doesn't make any sense my friend.

JakeCharles

Installing a network access control agent may provide additional security, but it does not address the immediate issue of the critical vulnerability and would not be the appropriate next step without first evaluating the risk and determining the cause of the vulnerability. Shutting down the vulnerable application server may provide a temporary solution, but it does not address the root cause of the vulnerability and could impact business operations. Deploying a new server may be a long-term solution, but it also does not address the immediate issue of the critical vulnerability and would not be the appropriate first step.

JakeCharles

In my opinion answer A is correct. NOW, maybe instead of questioning my answer you will choose correct answer and explain us why is it correct for you hm?

Yomoma

as much as people shit on jake his response aren't wrong. He's giving real world answers to solve the problem. the problem is the comptia does not like to use real world answer. So my advice is take comptia guide as a grain of salt cause alot the practices comptia wants you to do isnt done in the real world, coming from someone in the IT field.

Eumousten

If someone gives an detailed answer, let he do it. We all are here to learn, and you certainly know Comptia is very sneaky when it comes to there exams. They will try to catch you off guard by all means. So lets all be friends and help each other out please...

coolwhip

Not from ChatGPT. That is copied and pasted from vceUP.

Bermet

Thank you

StellarSteveOption: A

A for our homie Jake. also.... its A cuz this will help prevent attackers from exploiting the vulnerability to compromise the application or the underlying system.

MehsotopesOption: C

NAC is one aspect of network security. It provides visibility into the devices and users trying to access the enterprise network. And it controls who can access the network, including denying access to those users and devices that don't comply with security policies.

AsadArifOption: A

Its A because according to the Troubleshooting theory you have to first establish and verify that there is a problem. In this case there was only a report received. So first all the information gathering has to be done, then a theory of probable causes is to be established and tested, after which a plan of action is to be formulated and ONLY then an action is taken. Options B, C and D are all mitigation actions which is the step 4 and the question is still at Step 1.

Juliana1017Option: A

correct answer is A, you need to find out what the exploit could be and if it's a known exploit then it's easier to resolve. If it's known then there is probably a solution that has already been created.

famcoOption: A

Very subjective question although the answer is definitely A It depends on the vulnerability. I might immediately take it offline depending on the risk

MelzTheArtistOption: A

answer is A

JB1705Option: A

please correct me if im wrong. Network control access is to restrict access of devices and users and not application. Remaining answers dont make sense, thus A is the answer.

superzekeOption: A

I think A makes sense. For what it's worth, Messer says best practice is to gather information about the system configuration before you start making changes. Maybe the vulnerability being "critical" changes the answer, but I'm going with A.

Sizzle668Option: B

B seems the most logical and once that's done A

Nabski76

do we have to approach the exam thinking the Comptia way? or go with the correct answer?

drsamOption: C

May the "critically" cause the answer to be C instead of A?

Atomic_geekOption: C

Is the real answer A or C? If the real answer is A then why is C marked as the answer? This is confusing. . . .So if I got this question on the exam, I should mark the answer as C? wow