While regular review of the network security policy (option A) is important for ensuring that policies align with current security requirements, it is secondary to having a complete network asset inventory. The inventory provides the concrete basis upon which security policies and practices can be effectively applied and assessed.
During an external assessment of network vulnerability, the most important aspect to verify would be:
D. Completeness of network asset inventory
Verifying the completeness of the network asset inventory is crucial because it ensures that all network devices and systems are properly identified and accounted for. Without an accurate and comprehensive inventory, it would be challenging to assess the security posture of the network effectively. Missing or unaccounted assets can introduce vulnerabilities and potential entry points for attackers.
While the other options mentioned are also important considerations, they are not as fundamental as having a complete network asset inventory. Regular review of the network security policy helps ensure that security measures are up to date and aligned with the organization's requirements, but without a proper inventory, it may be difficult to implement those policies consistently.
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Swallows
5 months, 3 weeks agoItsBananass
1 year, 5 months agocybervds
1 year, 6 months ago