ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 185 - CS0-003 discussion

Report
Export

A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project:

. Must use minimal network bandwidth

. Must use minimal host resources

. Must provide accurate, near real-time updates

. Must not have any stored credentials in configuration on the scanner

Which of the following vulnerability scanning methods should be used to best meet these requirements?

A.
Internal
Answers
A.
Internal
B.
Agent
Answers
B.
Agent
C.
Active
Answers
C.
Active
D.
Uncredentialed
Answers
D.
Uncredentialed
Suggested answer: B

Explanation:

Agent-based vulnerability scanning is a method that uses software agents installed on the target systems to scan for vulnerabilities. This method meets the requirements of the project because it uses minimal network bandwidth and host resources, provides accurate and near real-time updates, and does not require any stored credentials on the scanner.

Reference: What Is Vulnerability Scanning? Types, Tools and Best Practices, Section: Types of vulnerability scanning; CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition, Chapter 4: Security Operations and Monitoring, page 154.

asked 02/10/2024
Viswanadha Sastry Kattamuri
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first