Joe a company's new security specialist is assigned a role to conduct monthly vulnerability scans across the network. He notices that the scanner is returning a large amount of false positives or failed audits. Which of the following should Joe recommend to remediate these issues?

A. Ensure the vulnerability scanner is located in a segmented VLAN that has access to the company's servers
B. Ensure the vulnerability scanner is configure to authenticate with a privileged account
C. Ensure the vulnerability scanner is attempting to exploit the weaknesses it discovers
D. Ensure the vulnerability scanner is conducting antivirus scanning


Answer: A. Ensure the vulnerability scanner is located in a segmented VLAN that has access to the company's servers

Computer Science & Information Technology

You might also like to view...

Design view shows the structure of the table with the fields and their definitions

Indicate whether the statement is true or false

Computer Science & Information Technology

In Project 2013, ________ moves a successor task back in time so the two tasks overlap and the Start date between the tasks gets closer

A) status date B) lag time C) lead time D) timescale

Computer Science & Information Technology

A(n) _____ is created using theselectandoptionelementsthat present users with a group of predefined possible valuesfor the data field.?

A. ?option button                                                                               B. ?selection list                                                                               C. ?check box D. ?text area

Computer Science & Information Technology

To change the file type to a different version of Excel, open the workbook you want to save to another format, click the File tab, then click ____.

A. Save B. Save As C. Save & Send D. Options

Computer Science & Information Technology