Policy allows scanning of vulnerabilities during production hours, but productio
ID: 3741805 • Letter: P
Question
Policy allows scanning of vulnerabilities during production hours, but production servers have been crashing lately due to unauthorized scans performed by junior technicians. Which of the following is the BEST solution to avoid production server downtime due to these types of scans? O A O B Transition from centralized to agent-based scans Require vulnerability scans be performed by trained personnel Configure daily-automated detailed vulnerability reports Scan only as required for regulatory compliance Implerment sandboxing to analyze the results of each scan .Explanation / Answer
A. In agent based scans ,it's encrypted to prevent unauthorised access. If an external party is employed for Assessment process. The organisation should ensure that any party involved is trustworthy And that both findings and proprietary information will kept secure.