An organization discovered a web application server without a record in its asset inventory. A security manager suspects there are other similar systems. Which approach is recognized for systematically uncovering unauthorized systems on the network?
Manual review of each system log to locate references to unregistered servers
Compiling department-provided lists of all hardware acquisitions
Waiting for users to submit email alerts about unnoticed equipment
Network scanning software that checks IP ranges and open ports to detect unknown hosts
Network scanning with specialized tools helps identify unregistered IP addresses, open ports, and host information across subnets. Manual log reviews or departmental lists can miss unrecorded devices, and user reports do not guarantee completeness.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network scanning and how does it work?
Open an interactive chat with Bash
What are some examples of network scanning tools?
Open an interactive chat with Bash
Why is manual log review less effective than network scanning for finding unauthorized devices?