A cybersecurity analyst is configuring a vulnerability scan for a highly utilized network that supports critical real-time processing systems. To maintain system performance and limit disruptions, which configuration is MOST appropriate for the scheduled scan?
Schedule the scan to occur during peak business hours
Scan continuously at a slow pace to spread the load
Performing vulnerability scans during periods of low activity (off-peak hours) is a widely recommended practice for production environments with performance-sensitive workloads. Running the scan when user and system demand is minimal reduces resource contention and avoids service degradation. Scanning continuously at a throttled pace still consumes resources throughout the day; scanning during peak hours risks noticeable slowdowns; and annual scans are too infrequent to provide timely security insight.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are vulnerability scans and why are they important?
Open an interactive chat with Bash
What does 'off-peak hours' mean in the context of scheduling vulnerability scans?
Open an interactive chat with Bash
What are the potential consequences of scanning during peak business hours?