The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?

a. Active scanning
b. Customized auditing
c. More accurate results
d. Safer scanning

Respuesta :

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

Answer:

The correct answer is letter "B": Customized auditing.

Explanation:

Credentialed scanning can be used for baseline or Policy Compliance. Most vulnerability scanners have a customized audit that allows them to find out if a system meets the company's minimum requirements. The audit templates can be set up for different types of serves and network equipment.