During which phase of a vulnerability assessment would a security consultant need to document a requirement to retain a legacy device that is no longer supported and cannot be taken offline?
B. Determining scope
Explanation: During the scope determination phase, a security consultant would identify and document any special requirements, such as retaining a legacy device that cannot be taken offline. This ensures that all constraints and limitations are clearly outlined before the assessment begins.
Incorrect Responses:
A. Conducting post-assessment tasks: This occurs after the assessment and focuses on reporting and follow-up actions, not defining the assessment requirements.
C. Identifying critical assets: This step focuses on determining which assets are most important to the organization, but does not specifically involve documenting the need to retain a legacy device.
D. Performing a vulnerability scan: This is a technical step where vulnerabilities are identified, but documenting exceptions like legacy devices happens earlier.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
044f354
1 month, 3 weeks ago