A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project:
• Must use minimal network bandwidth
• Must use minimal host resources
• Must provide accurate, near real-time updates
• Must not have any stored credentials in configuration on the scanner
Which of the following vulnerability scanning methods should be used to best meet these requirements?
cy_analyst
Highly Voted 7 months agovoiddraco
Most Recent 8 months, 3 weeks agogomet2000
8 months, 3 weeks agokinny4000
7 months, 1 week agosection8santa
1 year agoHL2020
1 year agothisguyfucks
1 year agojulessandrin
1 year, 2 months ago