A security analyst is running a vulnerability scan to check for missing patches during a suspected security rodent During which of the following phases of the response process is this activity MOST likely occurring?

A security analyst is running a vulnerability scan to check for missing patches during a suspected security rodent During which of the following phases of the response process is this activity MOST likely occurring?
A . Containment
B . Identification
C . Recovery
D . Preparation

Answer: B

Explanation:

Vulnerability scanning is a proactive security measure used to identify vulnerabilities in the network and systems.

Reference: CompTIA Security+ Study Guide 601, Chapter 4

Latest SY0-601 Dumps Valid Version with 396 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments