To validate local system-hardening requirements, which of the following types of vulnerability scans would work BEST to verify the scanned device meets security policies?
SCAP scans can be used to verify that a scanned device meets security policies by comparing the device configuration against a known set of security standards.
SCAP (Security Content Automation Protocol) is a method for using specific standards to help organizations automate vulnerability management and policy compliance evaluation.
SCAP automates vulnerability management and policy compliance evaluation
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.CS0-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
2Fish
2 years, 1 month agoforest111
2 years, 4 months agoComptia_Secret_Service
2 years, 4 months agoabrilo
2 years, 4 months ago