A cybersecurity analyst at a large corporation is tasked with implementing a vulnerability assessment methodology covering a fleet of remote servers that frequently change configuration and are not always online. Which approach should the analyst use to ensure effective and updated vulnerability assessment of these remote servers?
Schedule frequent agentless scans to ensure systems are assessed regularly
Utilize cloud-based assessment tools specific to server configuration management
Conduct agentless scanning with credentials for in-depth assessment
Implement agent-based scanning on all remote servers
|Incident Response and Management
|Reporting and Communication