A cybersecurity analyst at a large corporation is tasked with implementing a vulnerability assessment methodology covering a fleet of remote servers that frequently change configuration and are not always online. Which approach should the analyst use to ensure effective and updated vulnerability assessment of these remote servers?
Utilize cloud-based assessment tools specific to server configuration management
Implement agent-based scanning on all remote servers
Conduct agentless scanning with credentials for in-depth assessment
Schedule frequent agentless scans to ensure systems are assessed regularly
Agent-based scanning is the correct approach as agents are installed directly on the target systems, allowing for continuous and real-time scanning regardless of the systems' network availability or configuration changes. Unlike agentless scanning, which requires network connectivity and can miss changes if the system is offline during the scheduled scan, agent-based scanning is more suitable for dynamic environments with remote or intermittently connected assets.
Using credentials is incorrect because, although it deepens the level of scanning, it doesn't address the concern of systems being offline. Scheduling frequent scans may fail to recognize changes made between scans for systems that change configuration rapidly and are not always online. Cloud-based assessment tools address different needs and are particularly designed for assessing cloud service configurations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of agent-based scanning over agentless scanning?
Open an interactive chat with Bash
How does agent-based scanning handle systems that are frequently offline?
Open an interactive chat with Bash
What are some common challenges faced when implementing agent-based scanning?