1. Components of an ActiveVulnerability Scan consist of:A policy, credentials,scan zone, schedule, , and . Answer: Repository and Target List 2. are administrative level usernames and passwords used in authenticated scans? Answer: Credentials 3. True/False:You can associate multiple credentials with a single scan Answer: True 4. Networks using DHCP require what Active Scan setting be enabled toproperly track hosts Answer: Track hosts which have been issued new IP addresses 5. Which type ofscan obtainsinformation by authenticating to the host accessresources not available over the network Answer: Credentialed 6. True/False:You may only select one import repository per scan Answer: True 7. True/False: Once a scan is running, you cannot pause or stop it until it iscompleted Answer: False 8. Which Port Scanning Range option tells the scanner to scan only commonports? Answer: Default 9. In a low-bandwidth environment, which options might you adjust to try toimprove scanning performance? Answer: Max Simultaneous Checks Per Host and MaxSimultaneous Hosts Per Scan


No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Price $15.00
Add To Cart

Buy Now
Category exam bundles
Comments 0
Rating
Sales 0

Buy Our Plan

We have

The latest updated Study Material Bundle with 100% Satisfaction guarantee

Visit Now
{{ userMessage }}
Processing