Your organization is reviewing its vulnerability management process and requires a method to routinely identify new and unaddressed vulnerabilities on its network devices, servers, and workstations. Which of the following is the BEST method to accomplish this?
Implementing an enterprise-level firewall with advanced threat detection capabilities
Subscribing to threat feeds that include intelligence on the latest security risks
Regular vulnerability scanning is the best method for routinely identifying new and unaddressed vulnerabilities on network devices, servers, and workstations. It allows the organization to detect security weaknesses and ensure that they are addressed before they can be exploited. Although penetration testing can identify vulnerabilities, it is not typically conducted on a routine basis due to its complexity and cost. Threat feeds provide information on new threats but do not identify specific vulnerabilities in systems. Firewalls primarily protect against unauthorized access and do not scan for vulnerabilities within the network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is vulnerability scanning and how does it work?
Open an interactive chat with Bash
What are the differences between vulnerability scanning and penetration testing?
Open an interactive chat with Bash
How do threat feeds complement vulnerability scanning?