A vulnerability assessment solution is hosted in the cloud. This solution will be used as an accurate inventory data source for both the configuration management database and the governance, risk, and compliance tool. An analyst has been asked to automate the data acquisition. Which of the following would be the BEST way to acquire the data?
cyberseckid
Highly Voted 2 years, 9 months agoIT_Master_Tech
2 years, 7 months ago2Fish
2 years, 3 months agoindyrckstar
Most Recent 1 year, 5 months agoAyben
1 year, 8 months agoDree_Dogg
1 year, 9 months agouday1985
1 year, 10 months agouday1985
2 years, 1 month agoCosmic_robot
2 years, 3 months agojosbornx
2 years, 3 months agoJoInn
2 years, 3 months agoboletri
2 years, 4 months agoddcnsd65
2 years, 5 months agodavid124
2 years, 5 months agoCyberNoob404
2 years, 5 months agoOsagie
2 years, 6 months agoNickDrops
2 years, 5 months agomhop321
2 years, 5 months agoMrRobotJ
2 years, 7 months agoarctanx
2 years, 8 months agoedudarl
2 years, 8 months ago