In response to an audit finding, a company's Chief Information Officer (CIO) instructed the security department to increase the security posture of the vulnerability management program. Currently, the company's vulnerability management program has the following attributes:
✑ It is unauthenticated.
✑ It is at the minimum interval specified by the audit framework.
✑ It only scans well-known ports.
Which of the following would BEST increase the security posture of the vulnerability management program?
Riwon
1 year ago2Fish
1 year ago2Fish
1 year, 1 month agoCyberNoob404
1 year, 3 months agoAbyad
1 year, 5 months agoBig_Dre
8 months, 2 weeks agoryanzou
1 year, 6 months agononjabusiness
1 year, 7 months agoamateurguy
1 year, 7 months agoLaudy
1 year, 7 months ago