In: Computer Science
Which of the following considerations is the most important one in the use of a vulnerability scanning tool.
a. Multiple functionalities cannot replace the importance of a scanner being kept current to the latest vulnerabilities.
b. A vulnerability scanner is as good as the last time it was updated.
c. The graphical user interface addresses ease of use rather than the effectiveness of the scanner.
d. A vulnerability scanner does not need to have the ability to delete viruses.
Option (a) Multiple functionalities cannot replace the importance of a scanner is kept current to the latest vulnerabilities.
A vulnerability scanner need not have the ability to delete viruses. Even more than this capability, a vulnerability scanning tool must have the ability to scan for vulnerabilities that are "latest". Hence, the vulnerability scanning tool, from a software usage perspective, must be updated to be up-to-date with the latest viruses, vulnerabilities, weaknesses, errors, bugs, and flaws. A vulnerability scanning tool's Graphical User Interface (GUI) need not be easy to use, however, the tool itself must be very effective when it comes to scanning and detecting the vulnerabilities in software and configurations on a system. A vulnerability scanner must be updated all the time, especially when it is being run to scan for vulnerabilities. The tool is updated the last time it was run, is not sufficient to run it this time when there could be the latest vulnerabilities in the system.
It does not matter the number of functionalities a vulnerability scanning tool has. What matters is how the scanner is current to and updated with the latest vulnerabilities, as this is very important from the security standpoint.
It is always the best option for the vulnerability scanning tool to run in real-time, always connected to the Internet, to get the latest vulnerabilities, and security and other updates for the vulnerability scanning tool, and the tool runs automatically than run manually by someone. also, the tool should apply the latest updates, security patches, and update itself with the latest vulnerabilities, all done automatically.