COMPLETE 100 QUESTIONS WITH 100%
CORRECT DETAILED AND VERIFIED
ANSWERS BRAND NEW EXAM GRADE
A+ ASSURED
3 main aspects of implementing a software -
....ANSWER...Design
-you ideally want both an insider and outsider view of
network vulnerabilities, which is difficult to provide
unless you have a secure external facility through which
you can deploy your products from a hackers
perspective
--alleviated by cloud based solutions
Deployment
-requires servers to run the VM application, including
rolling out the required infrastructure and network
--Cloud based solutions have many operational
advantages such as instant deployment, mobile
workstation coverage, scalability, API included,
allowing for applications to talk to each other
Management
-requires hardware maintenance and backup to ensure
1
,scan results are dispersed efficiently across multiple
network segments and devices.
--Cloud based updates are automatic and instant for the
entire enterprise, as is data collection. Total cost of
ownership (TCO) is lower due to elimination of manual
deployment, management, and reporting.
Compliance
-With traditional software, data is owned by the user and
subject to extra scrutiny and skepticism by auditors due to
its manual collection.
--Easier to enforce with cloud because it is fully
automated, and the data is held by a secure third party.
Enforces access to VM functionality and reporting based
on a users role, which also protects the integrity of the
VM results.
What kind of things can a cybercriminal access without
VM - ....ANSWER...Personal or credit card info,
intellectual property, business secrets.
Anything that can be sold on the black market can be
exploited.
Cybercriminals can also use your network as a platform
to attack other networks.
Primary objectives of vulnerability management -
....ANSWER...The primary objectives of VM are to:
2
, bullet
Maintain a database of devices connecting to your
network and prioritize how they should be remediated.
bullet
Compile a list of installed software - your software
assets.
bullet
Change software configurations to make them less
susceptible to attack.
bullet
Patching and fixing operating system-related security
flaws in installed software.
bullet
Alert to additions of new devices, ports, or software to
the databases to analyze the changed attack surface and
detect successful attacks.
bullet
Indicate the most effective workflow for patching and
updating your devices to thwart attacks.
3