A financial services company is planning to conduct a vulnerability scan on its network. The company is bound by strict regulatory requirements that limit the times during which intensive network scanning can be performed. Additionally, they need to minimize performance impact on their operational systems during business hours. What is the most appropriate approach for scheduling the scan?
Perform the scan during off-peak hours to comply with regulatory requirements and to minimize impact.
Run the scan continuously throughout the day to cover both peak and off-peak traffic.
Delegate the scan times to an automated system, without regard for specific regulatory requirements.
Schedule the scan during peak business hours to ensure it captures real-time traffic patterns.
|Incident Response and Management
|Reporting and Communication