List of questions
Related questions
Question 185 - CS0-003 discussion
A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project:
. Must use minimal network bandwidth
. Must use minimal host resources
. Must provide accurate, near real-time updates
. Must not have any stored credentials in configuration on the scanner
Which of the following vulnerability scanning methods should be used to best meet these requirements?
A.
Internal
B.
Agent
C.
Active
D.
Uncredentialed
Your answer:
0 comments
Sorted by
Leave a comment first