In response to an audit finding, a company's Chief Information Officer (CIO) instructed the security department to increase the security posture of the vulnerability management program. Currently, the company's vulnerability management program has the following attributes:
✑ It is unauthenticated.
✑ It is at the minimum interval specified by the audit framework.
✑ It only scans well-known ports.
Which of the following would BEST increase the security posture of the vulnerability management program?
Riwon
2 years, 1 month ago2Fish
2 years, 1 month ago2Fish
2 years, 2 months agoCyberNoob404
2 years, 3 months agoAbyad
2 years, 6 months agoBig_Dre
1 year, 8 months agoryanzou
2 years, 7 months agononjabusiness
2 years, 7 months agoamateurguy
2 years, 8 months agoLaudy
2 years, 8 months ago