Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which of the following controls should be applied when running authenticated vulnerability scans? (select two)
Tie the account use to specific machines and IPs
Use multiple accounts with different privilege levels
Use a dedicated admin account
Use a single local account that has admin privileges on all systems
An attacker has to watch for scanner activity, and when the scanner logs in with domain privileges, it may be possible for the attacker to steal those credentials. It's good practice to limit the span of control of any single scanner account.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.