A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project:
• Must use minimal network bandwidth
• Must use minimal host resources
• Must provide accurate, near real-time updates
• Must not have any stored credentials in configuration on the scanner
Which of the following vulnerability scanning methods should be used to best meet these requirements?
cy_analyst
Highly Voted 10 months agovoiddraco
Most Recent 11 months, 3 weeks agogomet2000
11 months, 4 weeks agokinny4000
10 months, 1 week agosection8santa
1 year, 3 months agoHL2020
1 year, 4 months agothisguyfucks
1 year, 4 months agojulessandrin
1 year, 5 months ago