List at least four things that a vulnerability scanner can do.

What will be an ideal response?


A vulnerability scanner can do the following: Alert when new systems are added to the network. Detect when an application is compromised or subverted. Detect when an internal system begins to port scan other systems. Detect which ports are served and which ports are browsed for each individual system. Identify which applications and servers host or transmit sensitive data. Maintain a log of all interactive network sessions. Passively determine the type of operating system of each active system. Track all client and server application vulnerabilities. Track which systems communicate with other internal systems.

Computer Science & Information Technology

You might also like to view...

Which is NOT a step in creating a blog?

A) Creating a blog name B) Defining a URL C) Picking a design template D) Providing a Social Security number

Computer Science & Information Technology

A trivial functional dependency is one which satisfies X Y. Can a key be the set of all attributes if there is at least one non-trivial functional dependency in a schema? Explain.

What will be an ideal response?

Computer Science & Information Technology

After the Internetwork layer places its header on a datagram, what is the unit of information is referred to?

A. packet B. segment C. data D. frame

Computer Science & Information Technology

Every slide in a PowerPoint presentation has a footer, the area behind the text and graphics.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology