During a vulnerability assessment, a scanner identifies a vulnerable onsite server. After analyzing the server, you discover that its operating system is missing critical updates.

Assets, Threats, and Vulnerabilities | Weekly challenge 3 Quiz | 

During a vulnerability assessment, a scanner identifies a vulnerable onsite server. After analyzing the server, you discover that its operating system is missing critical updates.

What is the next step you should take in the vulnerability assessment process?

  • Scan the millions of devices that connect to the server.
  • Disregard the outdated operating system because the device is operational.
  • Deactivate the server because its operating system is outdated.
  • Perform a risk assessment of the old operating system.

 

Leave a Comment