Site icon Exam4Training

What is MOST important to verify during an external assessment of network vulnerability?

What is MOST important to verify during an external assessment of network vulnerability?
A . Update of security information event management (SIEM) rules
B . Regular review of the network security policy
C . Completeness of network asset inventory
D . Location of intrusion detection systems (IDS)

Answer: C

Explanation:

An external assessment of network vulnerability is a process of identifying and evaluating the weaknesses and risks that affect the security and availability of a network from an outsider’s perspective. The most important factor to verify during this process is the completeness of network asset inventory, which is a list of all the devices, systems, and software that are connected to or part of the network. A complete and accurate network asset inventory can help identify the scope and boundaries of the network, the potential attack vectors and entry points, the critical assets and dependencies, and the existing security controls and gaps. Without a complete network asset inventory, an external assessment of network vulnerability may miss some important assets or vulnerabilities, leading to inaccurate or incomplete results and recommendations.

References:

1 explains what is an external vulnerability scan and why it is important to have a complete network asset inventory.

2 provides a guide on how to conduct a full network vulnerability assessment and emphasizes the importance of knowing the network assets.

3 compares internal and external vulnerability scanning and highlights the need for a comprehensive network asset inventory for both types.

Latest CISA Dumps Valid Version with 2694 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version