اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 261 من 1040

كل الأسئلة

A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project: - Must use minimal network bandwidth - Must use minimal host resources - Must provide accurate, near real-time updates - Must not have any stored credentials in configuration on the scanner Which of the following vulnerability scanning methods should be used to best meet these requirements?

الخيارات

  • A Internal
  • B Agent
  • C Active
  • D Uncredentialed

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.