The statement is correct because vulnerability scanning is designed to identify system weaknesses, and this includes detecting changes in configurations which might compromise the security of the system. It's necessary for organizations to regularly perform these scans to ensure any modifications made to the system configurations don’t open new vulnerabilities or reintroduce previously remediated ones. Scanning is an ongoing process, not a one-time event, as systems and threats continuously evolve.
Learn More
AI Generated Content may display inaccurate information, always double-check anything important.
What are some common types of vulnerabilities that periodic scanning can detect?
How often should organizations perform vulnerability scans?
What tools are commonly used for vulnerability scanning?