
Ultimate access to all questions.
Your organization is planning to implement a comprehensive vulnerability management program to enhance its cybersecurity posture. The program must comply with industry standards, be cost-effective, and scalable to accommodate future growth. Given these requirements, which of the following steps is the MOST critical to initiate first in the design and implementation of this program? Choose one option.
A
Immediately deploy an automated vulnerability scanning tool across all networks to identify vulnerabilities without prior asset identification.
B
Conduct a thorough asset inventory to identify and categorize all systems, applications, and software in use within the organization.
C
Develop a risk-based prioritization strategy for vulnerability remediation before identifying any vulnerabilities.
D
Establish a continuous monitoring process without initial vulnerability assessment to ensure real-time detection of threats.
E
All of the above.