اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 910 من 1040

كل الأسئلة

A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project:

Must use minimal network bandwidth

Must use minimal host resources

Must provide accurate, near real-time updates

Must not have any stored credentials in configuration on the scanner

Which of the following vulnerability scanning methods should be used to best meet these requirements?

الخيارات

  • A Internal
  • B Agent
  • C Active
  • D Uncredentialed

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.