Multiple Choice
A security analyst is scanning the network to determine if a critical security patch was applied to all systems in an enterprise. The organization has a very low tolerance for risk when it comes to resource availability. Which of the following is the BEST approach for configuring and scheduling the scan?
A) Make sure the scan is credentialed, covers all hosts in the patch management system, and is scheduled during business hours so it can be terminated if it affects business operations.
B) Make sure the scan is uncredentialed, covers all hosts in the patch management system, and is scheduled during off-business hours so it has the least impact on operations.
C) Make sure the scan is credentialed, has the latest software and signature versions, covers all hosts in the patch management system, and is scheduled during off-business hours so it has the least impact on operations.
D) Make sure the scan is credentialed, uses a limited plugin set, scans all host IP addresses in the enterprise, and is scheduled during off-business hours so it has the least impact on operations.
Correct Answer:

Verified
Correct Answer:
Verified
Q29: Which of the following sources would a
Q30: An information security analyst on a threat-hunting
Q31: A pharmaceutical company's marketing team wants to
Q32: An analyst is working with a network
Q33: A security analyst is reviewing a web
Q35: Which of the following would MOST likely
Q36: A hybrid control is one that:<br>A) is
Q37: Which of the following sets of attributes
Q38: A security analyst is reviewing the following
Q39: A company is moving from the use