A cybersecurity analyst is configuring a vulnerability scan for a highly utilized network containing critical real-time processing systems. Given the need to maintain system performance and limit disruptions, which of the following would be the MOST appropriate configuration for the scheduled vulnerability scan?
Perform the scan during off-peak hours
Schedule the scan to occur during peak business hours
Scan continuously at a slow pace to spread the load
Conduct a comprehensive scan once a year only
Opt not to perform vulnerability scans to avoid any potential disruption
The correct answer is 'Perform the scan during off-peak hours.' Performing vulnerability scans during off-peak hours is a common practice to prevent performance degradation and service disruption, especially in networks with critical real-time processing systems where high availability is a must. Scheduled scans allow analysts to avoid peak traffic times, thus minimizing the impact on network and system performance. Conversely, scanning continuously at a slow pace can still affect performance, scanning during peak hours is likely to cause disruption, and once a year would not provide timely security data. Choosing to never scan is not an option for maintaining security posture.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are vulnerability scans and why are they important?
Open an interactive chat with Bash
What does 'off-peak hours' mean in the context of scheduling vulnerability scans?
Open an interactive chat with Bash
What are the potential consequences of scanning during peak business hours?