اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 288 من 1040

كل الأسئلة

A company is in the process of implementing a vulnerability management program. Which of the following scanning methods should be implemented to minimize the risk of OT/ICS devices malfunctioning due to the vulnerability identification process?

الخيارات

  • A Non-credentialed scanning
  • B Passive scanning
  • C Agent-based scanning
  • D Credentialed scanning

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.