184k views
2 votes
When reviewing vulnerability scan reports, why should you also review event logs and network data too?

a) To find the meaning of life.
b) To identify the source of vulnerabilities and their impact.
c) To improve your typing skills.
d) To calculate the square root of 256.

User Crjunk
by
8.4k points

1 Answer

2 votes

Final answer:

Reviewing event logs and network data alongside vulnerability scan reports is essential for identifying the source of vulnerabilities and understanding their impact on system security.

Step-by-step explanation:

When reviewing vulnerability scan reports, it's important to also review event logs and network data to identify the source of vulnerabilities and their impact, which is answer b). Vulnerability scans can alert you to potential security issues, but they cannot provide a full context. Event logs may show irregular activities that correlate with vulnerabilities found, revealing attempts to exploit them or actual breaches. Moreover, analyzing network data helps in understanding the traffic flow and patterns that may be associated with malicious activities or compromised systems. Both event logs and network data are essential for security analysis and can greatly inform the response and preventative measures that need to be taken.

User GRardB
by
7.3k points