List of questions
Related questions
Question 101 - CS0-003 discussion
A company is in the process of implementing a vulnerability management program. no-lich of the following scanning methods should be implemented to minimize the risk of OT/ICS devices malfunctioning due to the vulnerability identification process?
A.
Non-credentialed scanning
B.
Passive scanning
C.
Agent-based scanning
D.
Credentialed scanning
Your answer:
0 comments
Sorted by
Leave a comment first