1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
15

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed

scanning. In credentialed scanning, policy compliance plugins give you which advantage?
a. Active scanning
b. Customized auditing
c. More accurate results
d. Safer scanning
Computers and Technology
2 answers:
myrzilka [38]3 years ago
6 0

Answer:

The correct answer is letter "B": Customized auditing.

Explanation:

Credentialed scanning can be used for baseline or Policy Compliance. Most vulnerability scanners have a customized audit that allows them to find out if a system meets the company's minimum requirements. The audit templates can be set up for different types of serves and network equipment.

Zepler [3.9K]3 years ago
3 0

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

You might be interested in
Alice's Restaurant Supply offers a line of specialty food products to institutional
Illusion [34]

Answer:

1) the wireless standards that can be implemented are; IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and IEEE 802.11n. The pros and cons are in the attachment

2) 802.11g can be implemented in alice's restaurant. This is because it provides the fastest speed and has a wide range which will not be easily disturbed by other devices

3) Please check the attachment

4) Please check the attachment.

Explanation:

3 0
3 years ago
_____ is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it
babymother [125]

Answer:

Case-based reasoning.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Case-based reasoning is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it. It is typically based on cognitive science and artificial intelligence.

7 0
3 years ago
Function of Control Unit in a computer
Debora [2.8K]

Answer:

The control unit of the central processing unit regulates and integrates the operations of the computer. It selects and retrieves instructions from the main memory in proper sequence and interprets them so as to activate the other functional elements of the system at the appropriate moment

3 0
3 years ago
Olivia has developed a great presentation with a distinct purpose and excellent content. She delivered it in a workshop and got
Umnica [9.8K]

less time and depth is required for panel discussions

3 0
3 years ago
Explain vividly any operating system of your choice stating at least 3 distinguishing features of each version.
rosijanka [135]

Answer:

microsoft windows, macOS, and linux

Explanation:

if you need help let me know

7 0
3 years ago
Read 2 more answers
Other questions:
  • Match each vocabulary word to its definition.
    14·1 answer
  • Your client expresses that they want their new website to have a responsivedesign with consistent coding. They are concerned wit
    5·1 answer
  • The part of the computer that provides access to the internet is the?
    14·1 answer
  • Try writing pseudo code that describes how your device uses input data to perform the action that you want.
    9·1 answer
  • A two-dimensional array can be viewed as ___________ and _____________.
    10·1 answer
  • As a consommé simmers, the meat and eggs coagulate, forming a
    6·1 answer
  • What are the 4 features of the month-end review tool in quickbooks online accountant?
    14·1 answer
  • What is the key to satisfaction and success when choosing a career
    15·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • Digital Sep <br> helps as reimagine outcomes true or false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!