1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
15

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed

scanning. In credentialed scanning, policy compliance plugins give you which advantage?
a. Active scanning
b. Customized auditing
c. More accurate results
d. Safer scanning
Computers and Technology
2 answers:
myrzilka [38]3 years ago
6 0

Answer:

The correct answer is letter "B": Customized auditing.

Explanation:

Credentialed scanning can be used for baseline or Policy Compliance. Most vulnerability scanners have a customized audit that allows them to find out if a system meets the company's minimum requirements. The audit templates can be set up for different types of serves and network equipment.

Zepler [3.9K]3 years ago
3 0

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

You might be interested in
The type of database that is most capable of supporting complex data types is _____. Select one: a. sequential files b. relation
Anestetic [448]

Answer:

Object-Oriented DBMS.

Explanation:

Like classes in Object oriented programming Object-Oriented DBMS is can store objects.It follows an Object oriented data model with the properties of classes and the properties of Object oriented programming also.Objects can be in the form of complex data types or different data types.

6 0
3 years ago
Read 2 more answers
What must be done before using ArrayLists?<br><br> (This is Java Programming btw)
Viktor [21]

Answer:

to create an ArrayList , you declare an Arraylist variable and call the ArrayList constructor to instantiate and ArrayList object and assign it to the variable

5 0
3 years ago
PLEASE HELP!
Basile [38]

Answer:

declare count as integer

7 0
3 years ago
When you start a browser, it automatically loads and displays a page from a web site. This is known as your ____. Class: compute
EastWind [94]

Answer:

Index page.

Explanation:

The index page is the URL or local file that automatically loads when a web browser starts and when the browser's 'home' button is pressed. The term is also used to refer to the front page, web server directory index, or main web page of a website of a group, company, organization, or individual.

6 0
3 years ago
You are trying to create a user from the command line on a Linux computer. You get an error that permission is denied. What shou
Alisiya [41]

Answer:

preface the command with sudo

Explanation:

In the scenario being described, the best course of action would be to preface the command with sudo . This is because sudo is a program Linux operating system that allows the individual user to run programs with the security privileges of another user, which usually applies to the superuser. In this scenario, this would allow the user to bypass the error message and gain access to such a task.

5 0
3 years ago
Other questions:
  • Due to the internal style sheets of some browsers, your website may look different to someone who is using firefox as opposed to
    11·1 answer
  • Write a function called calculate() that accepts three integer Numbers as arguments, compute these values : Sum and Product and
    7·1 answer
  • Pinterest is most useful for?
    10·2 answers
  • The communication channel used in IMC must rev: 12_06_2018_QC_ CDR-223 Multiple Choice match the traditional channel used in tha
    14·1 answer
  • #Electrical Engineering
    13·1 answer
  • Suppose that f() is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointe
    15·1 answer
  • In Outlook 2016, the Tell Me function can be accessed by
    15·2 answers
  • Formulas should follow the___
    9·1 answer
  • -- of 5 points Question 3 1 try left While designing a new system, a company uncovered several processes that were quite rule-ba
    6·1 answer
  • We love silky. she is very honest join this by using conjunction ​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!