1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
4 years ago
15

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed

scanning. In credentialed scanning, policy compliance plugins give you which advantage?
a. Active scanning
b. Customized auditing
c. More accurate results
d. Safer scanning
Computers and Technology
2 answers:
myrzilka [38]4 years ago
6 0

Answer:

The correct answer is letter "B": Customized auditing.

Explanation:

Credentialed scanning can be used for baseline or Policy Compliance. Most vulnerability scanners have a customized audit that allows them to find out if a system meets the company's minimum requirements. The audit templates can be set up for different types of serves and network equipment.

Zepler [3.9K]4 years ago
3 0

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

You might be interested in
If you arrive at the same time as another user straight across from you yield if ___.
Tcecarenko [31]

Answer:

D

Explanation:

i just took the same exact quiz

4 0
4 years ago
Read 2 more answers
To add slides to a presentation, _____.
Effectus [21]
<span>select the New Slide option from the Insert menu</span>
7 0
4 years ago
Look at the following Python code:
aliya0001 [1]

Ump will be assigned to word2

word1[0:3] gets all of the letters from index 0 to index 3 exclusive (that means index 3 is not included)

4 0
3 years ago
When creating an electronic slide presentation, Lee should avoid
Amanda [17]

I believe the answer is <u>Using sound effects between slides.</u>

Using sound effects between slides can cause for a distraction, and if you are in college, your professor may not score your presentation as well as if it were made without sound effects. Hope this helps!

5 0
3 years ago
What does WAIS stand for?
rosijanka [135]

west Antarctic ice sheet

6 0
3 years ago
Read 2 more answers
Other questions:
  • How do you access the dark web? What are the negatives of doing this?
    14·1 answer
  • Users generally do not understand the concept of network drive sharing. they only know they can store their files "on my f: driv
    8·1 answer
  • The idea of supply and demand is based on the development of
    10·2 answers
  • Suppose you would like to urgently deliver 40 terabytes data from boston to los angeles. you have available a 100 mbps dedicated
    15·1 answer
  • 2x + 3y = 11<br>y = x-3​
    8·2 answers
  • Which statement is false? Select one: a. A class is to an object as a blueprint is to a house. b. Classes are reusable software
    5·1 answer
  • It is acceptable to create two TCP connections on the same server/port doublet from the same client/port doublet. True False
    9·1 answer
  • What is open source software? ​
    8·1 answer
  • In programming languages, ____ is used as a mnemonic representation for the program instruction’s memory address.
    9·1 answer
  • In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North Amer
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!