1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
4 years ago
15

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed

scanning. In credentialed scanning, policy compliance plugins give you which advantage?
a. Active scanning
b. Customized auditing
c. More accurate results
d. Safer scanning
Computers and Technology
2 answers:
myrzilka [38]4 years ago
6 0

Answer:

The correct answer is letter "B": Customized auditing.

Explanation:

Credentialed scanning can be used for baseline or Policy Compliance. Most vulnerability scanners have a customized audit that allows them to find out if a system meets the company's minimum requirements. The audit templates can be set up for different types of serves and network equipment.

Zepler [3.9K]4 years ago
3 0

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

You might be interested in
Implement a metho d to nd the k-th largest element in an array of size N using a minimum priority queue (MinPQ). Assume that the
diamong [38]

Sorry don't understand spanish,I am sure you can get it wrong,for crying out loud you people get checks for coming to United States

3 0
3 years ago
Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling,
Fittoniya [83]

Answer:

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center <u>aggregation</u> layer.

Explanation:

Consider the given information.

A key point for security and application services is the aggregation layer. In the data centre aggregation layer, the Layer 4 security and application services provide server load balancing, SSL offloading, firewalling, and IPS services.

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center <u>aggregation</u> layer.

7 0
3 years ago
Should i turn off my computer when a program becomes unresponsive?
DaniilM [7]
I'm not sure why you would need to. An unresponsive program should not effect the integrity of the system to require a reboot.

If an unresponsive program is being particular persistent and won't exit, CTRL + ALT + DEL then Task Manager, and clicking on the program in the "Processes" tab and clicking "End Task" is a reliable way to get rid of it.
4 0
3 years ago
What are the process of boots up a computer?​
Sindrei [870]

Answer:

in computer booting is the process of starting a computer it can be initiated By hardware such as button press or by a software command after it is switched on a computer central processing unit ( CPU)

3 0
3 years ago
Assignment 10: Create a Song of the Summer edhesive
Marrrta [24]

To create a song of the Summer edhesive you can use the Python Code,

which will help you create sections based on the music genre.

<h3 /><h3>What is Python code?</h3>

It corresponds to a programming language that enables the development of various media platforms, such as games, social networks and artificial intelligence applications.

Therefore, the Python code helps to automate tasks as it is an open-source language, allowing communication and adaptation of different objectives.

Find out more about Phython code here:

brainly.com/question/16397886

#SPJ1

3 0
2 years ago
Read 2 more answers
Other questions:
  • I need to know the answer to this question
    15·1 answer
  • What special identity group specifically includes any user account (except the Guest) logged into a computer or domain with a va
    14·1 answer
  • Data bars describe a graphic element that
    7·1 answer
  • A series of inventions led to the creation of the electronic digital computer shortly after this war..
    12·1 answer
  • Which examples demonstrate common Network Systems workplaces and employers? Check all that apply.
    13·2 answers
  • Shift Registers. What is a Bit Shift Register? What are the different types of Bit Shift Registers and what might be their appli
    11·1 answer
  • Suppose we want to adjust the page numbering for our Works Cited section so that it starts over at page 1. Is this possible to d
    12·2 answers
  • All portions, to include subject, title, paragraphs, sub-paragraphs, graphics, tables, charts, and bullet statements, must be pr
    12·1 answer
  • Consider a router that interconnects four subnets: S1, S2, S3, and S4. Suppose all of the interfaces in each of these four subne
    9·1 answer
  • I need help Asap!!! So the question is "Compare and contrast Web page and Websites". ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!