Question 522:
Which of the following methods minimizes the system interaction when gathering information to conduct a vulnerability assessment of a router?
Answer options:
A. Download the configuration B. Run a credentialed scan. C. Conduct the assessment during downtime D. Change the routing to bypass the router.