Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?
Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?
When establishing vulnerability scanning on critical IT infrastructure, the most important consideration is that the scanning will not degrade system performance. Ensuring that the system remains operational and performs efficiently even during the scanning process is crucial to maintaining the integrity and availability of critical IT services.
Vulnerability scanning of critical infrastructure must be performed without affecting the normal operation of the system. Scanning during peak hours may result in insufficient network bandwidth and resources, which may affect system performance. Therefore, it is recommended to select off-peak hours for scanning.