JASON DION SECTION 7 PRACTICE EXAM QUESTIONS WITH CORRECT DETAILED ANSWERS
A cybersecurity analyst is working at a college that wants to increase the security of its network by implementing vulnerability scans of centrally managed workstations, student laptops, and faculty laptops. Any proposed solution must be able to scale up and down as new students and faculty use the network. Additionally, the analyst wants to minimize the number of false positives to ensure accuracy in their results. The chosen solution must also be centrally-managed through an enterprise console. Which of the following scanning topologies would be BEST able to meet these requirements? A.Active scanning engine installed on the enterprise console B.Passive scanning engine located at the core of the network infrastructure C.Combination of cloud-based and server-based scanning engines D.Combination of server-based and agent-based scanning engines CORRECT ANSWER A.Active scanning engine installed on the enterprise console Explanation OBJ-2: Since the college wants to ensure there is a centrally-managed enterprise console, using an active scanning engine installed on the enterprise console would best meet these requirements. Then, the college's cybersecurity analysts could perform scans on any devices that are connected to the network using the active scanning engine at the desired intervals. D.Agent-based scanning would be ineffective since the college cannot force the installation of the agents onto each of the personally owned devices brought in by the students or faculty. C.A cloud-based or server-based engine may be useful, but it won't address the centrally-managed requirement. Passive scanning is less intrusive but is subject to a high number of false positives.
Written for
- Institution
- JASON DION
- Course
- JASON DION
Document information
- Uploaded on
- January 30, 2023
- Number of pages
- 58
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- student laptops
- and faculty l
-
a cybersecurity analyst is working at a college that wants to increase the security of its network by implementing vulnerability scans of centrally managed workstations