Which of the following techniques would a cybersecurity analyst perform to find all affected servers within an organization?

A threat intelligence feed has posted an alert stating there is a critical vulnerability in the kernel. Unfortunately, the company’s asset inventory is not current.

Which of the following techniques would a cybersecurity analyst perform to find all affected servers within an organization?
A . A manual log review from data sent to syslog
B . An OS fingerprinting scan across all hosts
C . A packet capture of data traversing the server network
D . A service discovery scan on the network

Answer: B

Latest CS0-001 Dumps Valid Version with 455 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments