During a vulnerability assessment, an organization notices that its scanning tool fails to detect several important servers. They suspect some configuration settings are preventing the tool from discovering them. Which step is best to address this issue?
Turn on verbose logging for the tool
Expand the scanning parameters to include the missing systems
Expanding the scanning parameters to include the missing systems ensures they are analyzed. Verbose logging can help with troubleshooting but does not necessarily correct coverage gaps. Traffic mirroring is a passive technique typically used for monitoring rather than adjusting scan scope. Switching approaches is often used for different testing objectives rather than discovering overlooked resources.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is expanding scanning parameters important in vulnerability assessments?
Open an interactive chat with Bash
What is verbose logging, and why wouldn’t it fix coverage gaps in scans?
Open an interactive chat with Bash
How does traffic mirroring differ from vulnerability scanning?