56.4k views
1 vote
A security analyst is attempting to break into a client's secure network. The analyst was not given prior information about the client, except for a block of public IP addresses that are currently in use.

After network enumeration, the analyst's NEXT step is to perform:

A. a gray-box penetration test
B. a risk analysis
C. a vulnerability assessment
D. an external security audit
E. a red team exercise

User Burrell
by
7.4k points

1 Answer

2 votes

Final answer:

After performing network enumeration, a security analyst should proceed with a vulnerability assessment. This step involves scanning the network for known vulnerabilities, which enables the analyst to identify and prioritize security issues for remediation.

Step-by-step explanation:

The question involves the steps taken by a security analyst after performing network enumeration in the context of securing a network. After enumeration, the analyst's NEXT step would be to perform a vulnerability assessment. This involves systematically scanning the network for known vulnerabilities, such as unpatched software, open ports, or misconfigurations, which could be exploited by attackers. A vulnerability assessment provides the security analyst with a prioritized list of security issues and potential mitigations.

User MS Berends
by
8.7k points