CompTIA CySA+ CS0-003 Practice Question
When performing a vulnerability scan on an environment that contains sensitive operational technology, such as an industrial control system, what type of scanning is recommended to minimize potential disruptions?
Active scanning
Passive scanning
Compliance scanning
Full port scanning