312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 172


An IT company has just implemented new security controls to their network and system setup. As a Certified Ethical Hacker, your responsibility is to assess the possible vulnerabilities in the new setup. You are given the information that the network and system are adequately patched with the latest updates, and all employees have gone through recent cybersecurity awareness training. Considering the potential vulnerability sources, what is the best initial approach to vulnerability assessment?

Show Answer
Correct Answer: B

Given that the network and system are adequately patched with the latest updates and all employees have gone through recent cybersecurity awareness training, the immediate concern should be identifying any possible hardware and software misconfigurations. Even with up-to-date patches and trained employees, configuration errors can still introduce significant vulnerabilities. Addressing these potential loopholes first ensures that the system's foundational setup is secure before moving on to other types of assessments.

Discussion

6 comments
Sign in to comment
insaniuntOption: B
Feb 11, 2024

B. Checking for hardware and software misconfigurations to identify any possible loopholes

qtygbapjpesdayazkoOption: B
Mar 24, 2024

Keyword "new setup". Checking for hardware and software misconfigurations to identify any possible loopholes

LordXanderOption: B
Mar 24, 2024

It's B because misconfiguration still can occur after proper pathing and training

cloudgangsterOption: B
Feb 6, 2024

I'm not sure but i think B

brrbrrOption: C
Feb 21, 2024

Given that the network and system are adequately patched, and employees have undergone recent cybersecurity awareness training, the best initial approach to vulnerability assessment would likely be: C. Evaluating the network for inherent technology weaknesses prone to specific types of attacks. While all the options are important aspects of a comprehensive vulnerability assessment, evaluating the network for inherent technology weaknesses helps identify potential vulnerabilities that may exist due to the configuration, design, or technology choices. This involves assessing the network for weaknesses that could be exploited by attackers, such as insecure protocols, open ports, or default configurations that may pose security risks. This step complements the information about the latest updates and cybersecurity awareness training by focusing on the technical aspects of the network's security posture.

brrbrr
Feb 22, 2024

actually, B is the correct answer.

athicalacker
Feb 22, 2024

The question mentions adequate patching, suggesting these weaknesses are likely addressed. So it can't be C. The answer is option B. Even with patches and training, misconfigurations can introduce vulnerabilities. Checking for them first allows you to identify and address fundamental flaws before proceeding to more advanced testing.

GK2205Option: B
Jul 21, 2024

The key to this question is "Best .. initial ..."