hardmultiple choiceObjective-mapped

Exhibit

Vulnerability scan summary:

1) Internet-facing VPN appliance
   CVSS: 8.8
   Exploit status: public proof-of-concept available
   Exposure: reachable from the internet
   Compensating controls: none

2) Internal HR file server
   CVSS: 9.8
   Exploit status: no public exploit yet
   Exposure: reachable only from the employee VLAN
   Compensating controls: segmented network and MFA for admin access

3) Lab workstation
   CVSS: 10.0
   Exploit status: public exploit available
   Exposure: isolated lab VLAN with no routing to production

4) DMZ reporting server
   CVSS: 7.5
   Exploit status: public exploit available
   Exposure: internet-reachable, but protected by WAF and IP allowlisting

Based on the exhibit, which issue should be remediated FIRST?

The team can only fully fix one issue today. Management wants the choice that best reduces real-world risk, not just the highest severity score.

Question 1hardmultiple choice
Full question →

Based on the exhibit, which issue should be remediated FIRST?

The team can only fully fix one issue today. Management wants the choice that best reduces real-world risk, not just the highest severity score.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Internet-facing VPN appliance

This asset is externally reachable, has a known public exploit, and lacks compensating controls. That combination creates the highest immediate likelihood of compromise.

B

Distractor review

Internal HR file server

The score is high, but the server is not directly internet-exposed and has layered controls that reduce immediate attack likelihood.

C

Distractor review

Lab workstation

Although severe, the lab is isolated from production, so the business impact and likelihood are much lower than an exposed perimeter device.

D

Distractor review

DMZ reporting server

The server is exposed, but the WAF and allowlist reduce practical exploitability compared with the VPN appliance that has no compensating controls.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Read the scenario before looking for a memorised answer.
  • Find the constraint that changes the correct option.
  • Eliminate answers that are true in general but not in this case.
  • Use explanations to understand the rule behind the answer.

TExam Day Tips

  • Underline the problem statement mentally.
  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Read the scenario before looking for a memorised answer.

What is the correct answer to this question?

The correct answer is: Internet-facing VPN appliance — The VPN appliance should be fixed first because risk is driven by both likelihood and impact, not CVSS alone. It is internet-facing, has a public exploit, and lacks compensating controls, so exploitation is highly likely and would affect remote access to the environment. The internal HR server has a higher score but much lower exposure. The lab workstation is isolated, and the DMZ reporting server has at least some protective controls already in place. Why others are wrong: A higher CVSS score does not automatically mean a higher remediation priority if exposure is limited. The internal HR server is harder to reach and protected by segmentation and MFA for administrators. The lab workstation is isolated from production, so compromise is less likely to matter operationally. The DMZ reporting server is exposed, but the WAF and allowlist materially lower attack likelihood relative to the unprotected VPN appliance.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.