In response to an audit finding, a company's Chief Information Officer (CIO) instructed the security department to increase the security posture of the vulnerability management program. Currently, the company's vulnerability management program has the following attributes:
✑ It is unauthenticated.
✑ It is at the minimum interval specified by the audit framework.
✑ It only scans well-known ports.
Which of the following would BEST increase the security posture of the vulnerability management program?
Riwon
2 years, 4 months ago2Fish
2 years, 3 months ago2Fish
2 years, 4 months agoCyberNoob404
2 years, 6 months agoAbyad
2 years, 8 months agoBig_Dre
1 year, 11 months agoryanzou
2 years, 9 months agononjabusiness
2 years, 10 months agoamateurguy
2 years, 10 months agoLaudy
2 years, 10 months ago