An IT manager is integrating a recently acquired network. Some systems may be exposed on external connections, and others are hidden on new subnets. Which method helps discover these hosts and ensure the existing inventory is correct?
Deploying a scanning tool across in-house, perimeter, and publicly routable address spaces, then comparing the findings with a central inventory
Asking departments to submit separate lists of equipment, then reconciling these lists at management level
Reviewing only public web directory headers to identify IP addresses and hostnames
Relying on filtered logs from user authentication servers to detect all active devices on the network
Automated network scanning across internal, external, and publicly routable address spaces provides the most comprehensive method for identifying hidden or untracked hosts. Comparing scan results against a central asset inventory, like a CMDB, ensures gaps are filled and rogue devices are detected. Manual data collection, limited web queries, or reliance on logs often miss critical systems, making them less reliable for accurate inventory during integration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a network scanning tool and how does it work?
Open an interactive chat with Bash
What is a CMDB, and how does it help with asset inventory?
Open an interactive chat with Bash
Why are manual methods like departmental lists or log reviews less effective than automated scanning?