A company has decided to lower costs by conducting an internal assessment on specific devices and various internal and external subnets.
The assessment will be done during regular office hours, but it must not affect any production servers.
Which of the following would MOST likely be used to complete the assessment? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E. F.AC.
Based on the given scenario, the company wants to conduct an internal assessment to identify vulnerabilities and risks associated with specific devices and internal/external subnets. The assessment should be done during regular office hours without affecting any production servers.
Out of the given options, the two most appropriate choices for conducting the assessment in this scenario are:
Agent-based vulnerability scan: An agent-based vulnerability scan involves installing a software agent on the target device to assess and identify vulnerabilities. This method is less intrusive than other scanning methods and can be performed during regular office hours without impacting production servers. The software agent can scan the system in real-time and provide accurate results. It is an effective method for identifying vulnerabilities and mitigating risks.
Configuration review: A configuration review involves examining the configuration settings of the devices and network infrastructure to identify potential vulnerabilities. This method does not involve actively scanning the devices or network infrastructure, so it can be done without affecting production servers. A configuration review can provide insight into potential security issues related to network settings, access control policies, and other configuration settings.
The other options are not as suitable for this scenario:
Black-box penetration testing: This type of testing involves simulating an attack on a network or system to identify vulnerabilities. It can be intrusive and may disrupt production servers if not carefully planned and executed.
Social engineering: Social engineering involves manipulating individuals to obtain sensitive information or access to systems. It is not an appropriate method for conducting an internal assessment of devices and subnets.
Malware sandboxing: Malware sandboxing involves isolating and analyzing potentially harmful software in a controlled environment. It is not a suitable method for conducting an internal assessment of devices and subnets.
Tabletop exercise: Tabletop exercises are simulated scenarios used to test the effectiveness of an organization's incident response plans. They are not appropriate for conducting an internal assessment of devices and subnets.