Which of the following would BEST Increase the security posture of the vulnerably management program?
In response to an audit finding, a company’s Chief information Officer (CIO) instructed the security department to Increase the security posture of the vulnerability management program. Currency, the company’s vulnerability management program has the following attributes:
Which of the following would BEST Increase the security posture of the vulnerably management program?
A . Expand the ports Being scanned lo Include al ports increase the scan interval to a number the business win accept without causing service interruption. Enable authentication and perform credentialed scans
B . Expand the ports being scanned to Include all ports. Keep the scan interval at its current level Enable authentication and perform credentialed scans.
C . Expand the ports being scanned to Include at ports increase the scan interval to a number the business will accept without causing service Interruption. Continue unauthenticated scans.
D . Continue scanning the well-known ports increase the scan interval to a number the business will accept without causing service Interruption. Enable authentication and perform credentialed scans.
Answer: A
Explanation:
A vulnerability scan is a process of identifying and assessing known vulnerabilities in a system or network using automated tools or software1 A vulnerability scan can help improve the security posture of a vulnerability management program by detecting and prioritizing potential weaknesses that could be exploited by attackers.
To increase the security posture of a vulnerability scan, the following actions can be taken:
✑ Expand the ports being scanned to include all ports: This means scanning all possible ports on a system or network, not just the well-known or commonly used ones. This can help discover more vulnerabilities that may be hidden or overlooked on less frequently used ports.
✑ Increase the scan interval to a number the business will accept without causing service interruption: This means scanning more frequently or regularly, but not so often that it causes performance issues or downtime for the system or network. This can help keep up with new vulnerabilities that may emerge over time and reduce the window of opportunity for attackers.
✑ Enable authentication and perform credentialed scans: This means using login credentials or SSH keys on an asset to get deeper access to its data, processes, configurations, and vulnerabilities2 This can help discover more vulnerabilities that cannot be seen from the network, such as insecure versions of software or poor security permissions.
Reference: 1 What Is Vulnerability Scanning? | Qualys 2 Credentialed Scans: Why You Need Them – Lansweeper IT Asset Management
Latest CS0-002 Dumps Valid Version with 220 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund