اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 86 من 1040

كل الأسئلة

A Chief Information Security Officer has
outlined several requirements for a new
vulnerability scanning project:

• Must use minimal network bandwidth
• Must use minimal host resources
• Must provide accurate, near real-time
updates
• Must not have any stored credentials in
configuration on the scanner

Which of the following vulnerability scanning methods should be used to best meet these
requirements?

الخيارات

  • A Internal
  • B Agent
  • C Active
  • D Uncredentialed

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.