1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
4 years ago
15

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed

scanning. In credentialed scanning, policy compliance plugins give you which advantage?
a. Active scanning
b. Customized auditing
c. More accurate results
d. Safer scanning
Computers and Technology
2 answers:
myrzilka [38]4 years ago
6 0

Answer:

The correct answer is letter "B": Customized auditing.

Explanation:

Credentialed scanning can be used for baseline or Policy Compliance. Most vulnerability scanners have a customized audit that allows them to find out if a system meets the company's minimum requirements. The audit templates can be set up for different types of serves and network equipment.

Zepler [3.9K]4 years ago
3 0

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

You might be interested in
During the software planning process, Rick, a project manager, finds that his team has made an incorrect estimation of funds. Wh
allochka39001 [22]

Answer:

Rick has identified a cost risk.

Explanation:

Risk is the probability of loss in a given setting. Herein, the risk involved is the inadequate assessment of the costs involved to carry out the project usually as a result of poor pricing evaluation of resources required for the project. At the early stage of every project, effective and efficient cost estimation is needed because it provides a basis for estimation of the total costs, it helps distribute the cost budget, it eases decision making and thereby assuring a level of profitability, everything being equal.

7 0
3 years ago
Read 2 more answers
The Review feature automatically adjusts to select the edited information.<br> true of false
NNADVOKAT [17]
True I hope this helps
8 0
3 years ago
Read 2 more answers
6. kinukuha nito ang kabuuang bilang ng mga numerical na datos sa mga piniling cells
horrorfan [7]

Answer:

1.  Sum Function

2. Average Function

3. Max Function

4. Min Function

5. Count Function

Explanation:

4 0
3 years ago
A standard cd-rom is called a single-session disc. why are they called single-session discs?
katrin [286]
CD-ROM= Compact Disc- Read Only Memory (Can only be used once)
6 0
3 years ago
Page UND
DochEvi [55]

Answer:

d. All of the above

Explanation:

Suppose a student needs help regarding any technical issue like computer is not working, or he/she cannot open the file, or any problem with a link, then he can ask your facilitator for help, or he can call or email the support center, or he can look for help in the student resources section as well of the course. Hence, all the options are correct. And hence the correct answer is d.

6 0
4 years ago
Other questions:
  • Timing circuits are a crucial component of VLSI chips. Here’s a simple model of such a timing circuit. Consider a complete balan
    10·1 answer
  • Write a sentinel-controlled while loop that accumulates a set of integer test scores input by the user until negative 99 is ente
    8·1 answer
  • When configuring services, what linux directory typically contains server configuration files?
    8·1 answer
  • The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requir
    8·1 answer
  • Question 7 of 10
    13·1 answer
  • What are the basic functions of an operating system? List any four of them.​
    13·1 answer
  • Pls help me!! I will give 35 points and mark brainliest !!!
    10·1 answer
  • Where can you get information on receiving financial help?
    12·1 answer
  • What is the first thing you should do when you open a savings account
    11·1 answer
  • - Discuss the input-process-output model as it relates to program development.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!