Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam Cybersecurity-Audit-Certificate Topic 1 Question 7 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 7
Topic #: 1
[All Cybersecurity-Audit-Certificate Questions]

he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:

Show Suggested Answer Hide Answer
Suggested Answer: D

The MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization is using avirtual local area network (VLAN). A VLAN is a logical grouping of network devices that share the same broadcast domain regardless of their physical location or connection. A VLAN can enhance network security by isolating different types of traffic or users from each other and applying different security policies or rules based on the VLAN membership. For example, an organization can create a VLAN for HR desktops and internal laptop users that restricts their access to only HR-related systems or resources. A VLAN can also reduce network costs by saving bandwidth, improving performance, and simplifying management.


Contribute your Thoughts:

Kirby
8 days ago
I think the most significant limitation is that vulnerability scanners can only detect known vulnerabilities. There are always going to be unknown and zero-day vulnerabilities out there that they can't catch.
upvoted 0 times
...
Rory
10 days ago
But wouldn't detecting common vulnerabilities still be helpful in securing systems, even if it's not perfect?
upvoted 0 times
...
Lisandra
13 days ago
I agree with Truman, detecting only known vulnerabilities can leave systems vulnerable to zero-day exploits.
upvoted 0 times
...
Truman
14 days ago
I think the most significant limitation is that scanners only detect known vulnerabilities.
upvoted 0 times
...

Save Cancel