CompTIA CySA+ CS0-003 Practice Question
When scheduling a vulnerability scan for a critical system that has limited resources and cannot afford the overhead of installed software, which scanning method should be employed?
Non-credentialed agent-based scanning
Dynamic scanning incorporating reverse engineering
Credentialed agent-based scanning
Agentless scanning