CompTIA CySA+ CS0-003 Practice Question
After conducting a vulnerability assessment, you receive a report indicating several vulnerabilities across various systems. One particular vulnerability is found in a system component that is not exposed to the internet, requires privileged network access to exploit, and has no known active exploits. However, if exploited, the vulnerability could lead to a complete system takeover. Which of the following best represents the risk score that should be assigned to this vulnerability?
The vulnerability should be assigned a medium risk score.
The vulnerability should be assigned a low risk score as it is not exposed to the internet.
The vulnerability should be assigned a high risk score because it requires privileged network access.
The vulnerability should be assigned a critical risk score due to the potential impact of a system takeover.