Which item includes a list of resolved vulnerabilities?

Prepare for the EC-Council Certified Ethical Hacker (CEH) Certification. Master concepts with flashcards and multiple choice questions, each enriching your understanding. Ready yourself to succeed in your exam!

Multiple Choice

Which item includes a list of resolved vulnerabilities?

Explanation:
Tracking completed fixes requires a record that shows what was found and what has been resolved. A security vulnerability summary serves that purpose by listing each vulnerability identified and indicating its status, including which ones have been fixed and how those fixes were verified. This makes it the authoritative history of closed vulnerabilities, helpful for audits, reporting, and demonstrating remediation progress. Threat modeling focuses on identifying potential threats and attack paths, not on documenting resolved issues. Risk assessment weighs overall risk but doesn’t typically enumerate repaired vulnerabilities. A remediation plan describes intended fixes and timelines, but it isn’t the ongoing record of what has already been resolved.

Tracking completed fixes requires a record that shows what was found and what has been resolved. A security vulnerability summary serves that purpose by listing each vulnerability identified and indicating its status, including which ones have been fixed and how those fixes were verified. This makes it the authoritative history of closed vulnerabilities, helpful for audits, reporting, and demonstrating remediation progress.

Threat modeling focuses on identifying potential threats and attack paths, not on documenting resolved issues. Risk assessment weighs overall risk but doesn’t typically enumerate repaired vulnerabilities. A remediation plan describes intended fixes and timelines, but it isn’t the ongoing record of what has already been resolved.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy