Based on the exhibit, which issue should be remediated first by the operations team?
A small company has limited maintenance windows and can address only one of several findings this week.
Weekly vulnerability report: 1. vpn-gw01 - Exposure: Internet-facing - Finding: Critical remote code execution - Notes: Vendor patch available; reboot required 2. db-lab02 - Exposure: Internal only - Finding: High-severity authentication bypass - Notes: Isolated lab subnet; no sensitive data; no route to production 3. printsrv03 - Exposure: Internet-facing administrative portal - Finding: Medium-severity outdated firmware - Notes: Vendor has not released a fix yet; temporary ACL blocks the admin port from the internet
Based on the exhibit, which issue should be remediated first by the operations team?
A small company has limited maintenance windows and can address only one of several findings this week.
Answer choices
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
db-lab02, because high-severity findings always outrank medium and critical findings.
Severity alone is not enough; exposure and business impact are critical to prioritization.
printsrv03, because it is internet-facing and has no vendor patch available.
Although it is exposed, the temporary ACL reduces risk and there is no immediate fix to apply.
vpn-gw01, because it is internet-facing, exploitable now, and a fix is available.
The VPN gateway is the most urgent issue because it is externally reachable, has a critical remote code execution flaw, and a vendor patch already exists. That combination creates high likelihood and high impact. The reboot requirement is inconvenient, but it is still the most actionable and dangerous finding. The other issues are either isolated from production or partially mitigated by compensating controls.
None of these, because the team should wait for the next quarterly review before changing anything.
Deferring all work would ignore an exploitable internet-facing critical vulnerability with an available fix.
Common exam trap
NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.
Technical deep dive
NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.
Related practice questions
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
Practise SY0-701 questions linked to Security+ social engineering questions.
Practise SY0-701 questions linked to Security+ cryptography.
Practise SY0-701 questions linked to Security+ IAM questions.
Practise SY0-701 questions linked to Security+ risk management questions.
Practise SY0-701 questions linked to Security+ incident response questions.
Practise SY0-701 questions linked to Security+ malware questions.
Practise SY0-701 questions linked to Security+ vulnerability management questions.
Practise SY0-701 questions linked to Security+ security operations questions.
Practise SY0-701 questions linked to Security+ zero trust questions.
Practise SY0-701 questions linked to Security+ authentication factors questions.
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
Question 2
Question 3
Question 4
Question 5
Question 6
FAQ
Static NAT maps one inside address to one outside address.
The correct answer is: vpn-gw01, because it is internet-facing, exploitable now, and a fix is available. — The VPN gateway should be remediated first because it is both exposed and actively fixable. An internet-facing critical RCE creates the highest likelihood of compromise and the highest potential business impact, especially on a remote access entry point. The isolated lab host is lower risk because it lacks production reach, and the print server’s admin portal already has a compensating ACL that reduces exposure until a vendor patch exists. Why others are wrong: Option A incorrectly ranks by severity alone and ignores exposure and reachability. Option B is less urgent because the ACL already narrows attack surface and no patch is currently available. Option D is inconsistent with operational risk management because the team has enough information to act now on the highest-risk item.
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Sign in to join the discussion.