Valid CISA Dumps shared by ExamDiscuss.com for Helping Passing CISA Exam! ExamDiscuss.com now offer the newest CISA exam dumps, the ExamDiscuss.com CISA exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com CISA dumps with Test Engine here:
What is MOST important to verify during an external assessment of network vulnerability?
Correct Answer: C
An external assessment of network vulnerability is a process of identifying and evaluating the weaknesses and risks that affect the security and availability of a network froman outsider's perspective. The most important factor to verify during this process is the completeness of network asset inventory, which is a list of all the devices, systems, and software that are connected to or part of the network. A complete and accurate network asset inventory can help identify the scope and boundaries of the network, the potential attack vectors and entry points, the critical assets and dependencies, and the existing security controls and gaps. Without a complete network asset inventory, an external assessment of network vulnerability may miss some important assets or vulnerabilities, leading to inaccurate or incomplete results and recommendations. References: * 1 explains what is an external vulnerability scan and why it is important to have a complete network asset inventory. * 2 provides a guide on how to conduct a full network vulnerability assessment and emphasizes the importance of knowing the network assets. * 3 compares internal and external vulnerability scanning and highlights the need for a comprehensive network asset inventory for both types.