Assets, Threats, and Vulnerabilities | Weekly challenge 3 Quiz |
During a vulnerability assessment, a scanner identifies a vulnerable onsite server. After analyzing the server, you discover that its operating system is missing critical updates.
What is the next step you should take in the vulnerability assessment process?
- Scan the millions of devices that connect to the server.
- Disregard the outdated operating system because the device is operational.
- Deactivate the server because its operating system is outdated.
- Perform a risk assessment of the old operating system.