1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
4 years ago
15

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed

scanning. In credentialed scanning, policy compliance plugins give you which advantage?
a. Active scanning
b. Customized auditing
c. More accurate results
d. Safer scanning
Computers and Technology
2 answers:
myrzilka [38]4 years ago
6 0

Answer:

The correct answer is letter "B": Customized auditing.

Explanation:

Credentialed scanning can be used for baseline or Policy Compliance. Most vulnerability scanners have a customized audit that allows them to find out if a system meets the company's minimum requirements. The audit templates can be set up for different types of serves and network equipment.

Zepler [3.9K]4 years ago
3 0

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

You might be interested in
What does cuda stand for
ludmilkaskok [199]
Compute unified device architecture
6 0
4 years ago
Read 2 more answers
Oskar has been receiving emails about critical threat intelligence information from a public information sharing center. His tea
zlopas [31]

The technology that Oskar is going to recommend for the automated process would be the automated indicator sharing.

<h3>What is the automated indicator sharing?</h3>

This is a cyber security and also an infrastructure security operations that helps to show cyber threat indicators in real time.

They help to prevent cyber attacks and also put in the measures that can protect the members of the community.

Read more on the automated processes here: brainly.com/question/25707319

4 0
2 years ago
A structure that organizes data in a list that is commonly 1- dimensional or 2- dimensional
kogti [31]

Answer:

  (a)  Array

Explanation:

An array is a data structure that can be used to organize 1- or 2-dimensional data in a list.

5 0
3 years ago
Read 2 more answers
IPv4 and IPv6 are addresses used to identify computers on the Internet. Is this whether true or not:
Tpy6a [65]

Answer:

true

Explanation:

8 0
3 years ago
Sandy’s keyboard is not inputting data into her computer. Which key should she press to verify it is connected to her computer?
mote1985 [20]

Sandy can press "Caps Lock", "Scroll Lock" or "Num Lock" to check if the keyboard is connected to the computer. If the keyboard is connected, than the light will be upped on the keyboard for each one of the lock key. If the keyboard isn't connected than there will be no light on the keyboard.


So, she should press either "Caps Lock", "Scroll Lock" or "Num Lock" and check the light on the keyboard.

5 0
3 years ago
Read 2 more answers
Other questions:
  • What does using indirect quotations allow a writer to do?
    7·2 answers
  • Which function is used to display a string value to the screen?
    8·1 answer
  • Which button would you use to quickly add addresses to a mail merge envelope?
    5·1 answer
  • If a user copies the formula D15 into D16, what would the formula read in D16?
    15·2 answers
  • Nina is explaining the SQA process to her friend Amanda.
    9·1 answer
  • What function is the responsibility of the network layer?
    10·1 answer
  • Which of the following does a histogram resemble the most?
    13·1 answer
  • Why do organizations create multiple databases?
    12·1 answer
  • Which of the following substances increases in quantity during repititive muscle contraction during oxygen deficti ?
    11·1 answer
  • general electric always includes an owner registration form with its products. it asks customers for their names, addresses, pho
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!