After completing a vulnerability scan, your team has identified several security weaknesses on the organization's public-facing web server. What is the most appropriate next step to manage the identified security risks?
Applying necessary patches and configuration changes to the web server.
Disabling all non-critical services on the web server to minimize the attack surface.
Scheduling a meeting with stakeholders to discuss the potential impact of the vulnerabilities.
Conducting a penetration test to check if vulnerabilities can be exploited.
In the vulnerability management lifecycle, once vulnerabilities are discovered and recorded, the next phase is remediation or mitigation. This typically involves applying vendor patches or making configuration changes that directly address the weaknesses and reduce the likelihood or impact of exploitation. Other actions-such as stakeholder meetings, disabling non-critical services, or running a penetration test-may occur later or in parallel, but they do not remediate the vulnerabilities themselves.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is vulnerability scanning, and why is it important?
Open an interactive chat with Bash
What are examples of patches and configuration changes?
Open an interactive chat with Bash
What is the difference between a vulnerability scan and a penetration test?