312-50v13 Exam QuestionsBrowse all questions from this exam

312-50v13 Exam - Question 139


In the process of implementing a network vulnerability assessment strategy for a tech company, the security analyst is confronted with the following scenarios:

1) A legacy application is discovered on the network, which no longer receives updates from the vendor.

2) Several systems in the network are found running outdated versions of web browsers prone to distributed attacks.

3) The network firewall has been configured using default settings and passwords.

4) Certain TCP/IP protocols used in the organization are inherently insecure.

The security analyst decides to use vulnerability scanning software. Which of the following limitations of vulnerability assessment should the analyst be most cautious about in this context?

Show Answer
Correct Answer:

Discussion

2 comments
Sign in to comment
GibsomdOption: A
Mar 16, 2025

Vulnerability scanners are automated tools designed to identify security weaknesses in a network, but they do not provide contextual insights into how these vulnerabilities impact specific business operations.

CherubaelOption: A
May 2, 2025

What answer A. should have been worded as: "Vulnerability scanners cannot define a vulnerability's impact on business operations." This is a really dumb question that should not even be on the exam due to the poor verbiage in the multiple choice.