During a routine scan, multiple potential issues were flagged. Which approach best aligns with the evaluation stage in vulnerability management, where discovered weaknesses are analyzed for severity and impact on operations? Select the BEST answer.
Scrutinize discovered weaknesses to determine risk levels, then prioritize efforts based on potential harm
Keep weaknesses in an archived list until the next scheduled repair window
Ignore low-level weaknesses and address issues reported by users
Patch critical components and omit other components from further inspection
The thorough analysis of each discovered weakness provides an accurate picture of potential harm and informs which issues merit higher priority for remediation. Other approaches delay timely action or apply partial fixes, which can leave serious weaknesses unaddressed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the evaluation stage in vulnerability management?
Open an interactive chat with Bash
How are risk levels determined during the evaluation stage?
Open an interactive chat with Bash
Why is prioritization important in vulnerability management?