Logs, SIEM systems, and configuration management systems are all good sources of information to validate scan results.

Group of answer choices

True

False

1 answer

True

Logs, SIEM (Security Information and Event Management) systems, and configuration management systems can all provide valuable information that helps validate the results of scans, such as vulnerability scans or security assessments. These sources can confirm whether vulnerabilities are present, provide context about system configurations, and track changes over time.