Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which of these is a common oversight for vulnerability countermeasures?
Reinstalling operating systems
Monitoring event logs
Backing up data
Documenting installation procedures
The correct response is monitoring event viewer logs. This is important for vulnerability countermeasures and the logs are of no use if they are not viewed or analyzed. **This isn't really a countermeasure for a vulnerability. Monitoring event logs would not show a vulnerability was present, but it would show if it had been exploited. A countermeasure or compensating control for a vulnerability would be placing a firewall in front of the network/system to prevent traffic, installing an IPS, etc.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.