A security analyst is scanning the network to determine if a critical security patch was applied to all systems in an enterprise. The organization has a very low tolerance for risk when it comes to resource availability. Which of the following is the BEST approach for configuring and scheduling the scan?
A) Make sure the scan is credentialed, covers all hosts in the patch management system, and is scheduled during business hours so it can be terminated if it affects business operations.
B) Make sure the scan is uncredentialed, covers all hosts in the patch management system, and is scheduled during off-business hours so it has the least impact on operations.
C) Make sure the scan is credentialed, has the latest software and signature versions, covers all hosts in the patch management system, and is scheduled during off-business hours so it has the least impact on operations.
D) Make sure the scan is credentialed, uses a limited plugin set, scans all host IP addresses in the enterprise, and is scheduled during off-business hours so it has the least impact on operations.
Correct Answer:
Verified
Q125: An executive assistant wants to onboard a
Q126: Which of the following sources would a
Q127: An organization used a third party to
Q128: A custom script currently monitors real-time logs
Q129: A security analyst is investigating malicious traffic
Q131: A security analyst is reviewing the following
Q132: An analyst is reviewing the following code
Q133: An information security analyst on a threat-hunting
Q134: Which of the following should a database
Q135: A large organization wants to move account
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents