{"id":85,"date":"2022-11-25T17:23:20","date_gmt":"2022-11-25T17:23:20","guid":{"rendered":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/comptia-cysacs0-002-question079\/"},"modified":"2022-11-25T17:23:20","modified_gmt":"2022-11-25T17:23:20","slug":"comptia-cysacs0-002-question079","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/comptia-cysacs0-002-question079\/","title":{"rendered":"CompTIA CySA+CS0-002 &#8211; Question079"},"content":{"rendered":"<div class=\"question\">A business recently acquired a software company. The software company&#039;s security posture is unknown.<br \/>\nHowever, based on an initial assessment, there are limited security controls. No significant security monitoring exists. Which of the following is the NEXT step that should be completed to obtain information about the software company&#039;s security posture?<br \/><strong><br \/>A.<\/strong> Develop an asset inventory to determine the systems within the software company.<br \/><strong>B.<\/strong> Review relevant network drawings, diagrams, and documentation.<br \/><strong>C.<\/strong> Perform penetration tests against the software company&#039;s internal and external networks.<br \/><strong>D.<\/strong> Baseline the software company&#039;s network to determine the ports and protocols in use.<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>A<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>A business recently acquired a software company. The software company&#039;s security posture is unknown. However, based on an initial assessment, there are limited security controls. No significant security monitoring exists. Which of the following is the NEXT step that should be completed to obtain information about the software company&#039;s security posture?A. Develop an asset inventory [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,82],"class_list":["post-85","post","type-post","status-publish","format-standard","hentry","category-comptia-cysacs0-002","tag-comptia-cysacs0-002","tag-question-079"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/posts\/85","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/comments?post=85"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/posts\/85\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/media?parent=85"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/categories?post=85"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CySA+CS0-002\/wp-json\/wp\/v2\/tags?post=85"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}