ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 101 - CS0-003 discussion

Report
Export

A company is in the process of implementing a vulnerability management program. no-lich of the following scanning methods should be implemented to minimize the risk of OT/ICS devices malfunctioning due to the vulnerability identification process?

A.
Non-credentialed scanning
Answers
A.
Non-credentialed scanning
B.
Passive scanning
Answers
B.
Passive scanning
C.
Agent-based scanning
Answers
C.
Agent-based scanning
D.
Credentialed scanning
Answers
D.
Credentialed scanning
Suggested answer: B

Explanation:

Passive scanning is a method of vulnerability identification that does not send any packets or probes to the target devices, but rather observes and analyzes the network traffic passively. Passive scanning can minimize the risk of OT/ICS devices malfunctioning due to the vulnerability identification process, as it does not interfere with the normal operation of the devices or cause any network disruption. Passive scanning can also detect vulnerabilities that active scanning may miss, such as misconfigured devices, rogue devices or unauthorized traffic. Official

Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-cysa-cs0-002-exam-objectives

https://www.comptia.org/blog/the-new-comptia-cybersecurity-analyst-your-questions-answered

https://www.comptia.org/certifications/cybersecurity-analyst

asked 02/10/2024
Javier Cardaba Enjuto
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first