Which of the following techniques would a cybersecurity…

A threat intelligence feed has posted an alert stating there is a critical vulnerability in the kernel. Unfortunately, the company’s asset inventory is not current. Which of the following techniques would a cybersecurity analyst perform to find all affected servers within an organization?

A threat intelligence feed has posted an alert stating there is a critical vulnerability in the kernel. Unfortunately, the company’s asset inventory is not current. Which of the following techniques would a cybersecurity analyst perform to find all affected servers within an organization?

A.
A manual log review from data sent to syslog

B.
An OS fingerprinting scan across all hosts

C.
A packet capture of data traversing the server network

D.
A service discovery scan on the network

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *