اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 847 من 1040

كل الأسئلة

A security analyst is implementing a process to perform vulnerability management on an OT environment:
Systems must remain on an isolated network.
The process should focus on external threats.
No additional software can be deployed on the systems.
Transmitted packets cannot be modified or dropped.
Additional processing delays are not tolerated.
Which of the following is the best way to securely meet the requirements?

الخيارات

  • A Implement agentless sensors at the network edge.
  • B Use reverse engineering to detect flaws on the in-scope systems.
  • C Deploy an IPS in-line with the network traffic.
  • D Check the compatibility of an EDR agent with the OSs used on the OT environment.

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.