اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 726 من 1040

كل الأسئلة

A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project: Must use minimal network bandwidth, Must use minimal host resources, Must provide accurate, near real-time updates, Must not have any stored credentials in configuration on the scanner. Which of the following vulnerability scanning methods should be used to best meet these requirements?

الخيارات

  • A Internal
  • B Agent
  • C Active
  • D Uncredentialed

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.