List of questions
Related questions
Question 57 - CS0-003 discussion
A company is in the process of implementing a vulnerability management program, and there are concerns about granting the security team access to sensitive data. Which of the following scanning methods can be implemented to reduce the access to systems while providing the most accurate vulnerability scan results?
A.
Credentialed network scanning
B.
Passive scanning
C.
Agent-based scanning
D.
Dynamic scanning
Your answer:
0 comments
Sorted by
Leave a comment first