What is vulnerability scanning, and what are the two different types of vulnerability scans?
What will be an ideal response?
ANSWER: Vulnerability scanning is used to identify vulnerabilities in a network. It's often performed by a company's own staff, and does not attempt to exploit any vulnerabilities. Vulnerability scanning might also be the first step in other attack simulations or in a real attack. During attack simulations, there are two types of vulnerability scans:
* authenticated-In this case, the attacker is given the same access to the network as a trusted user would have, such as an employee or an intruder who has somehow hacked into a user's account.
* unauthenticated-In this case, the attacker begins on the perimeter of the network, looking for vulnerabilities that do not require trusted user privileges.
You might also like to view...
In a binary search tree each item has a uniquely valued data component called a(n) _____________________
What will be an ideal response?
The y-axis on a chart is also known as the ________ axis
Fill in the blank(s) with correct word
Format Painter enables you to copy formatting from one worksheet cell to another without copying the cell's contents.
Answer the following statement true (T) or false (F)
The ____ page replacement policy is based on the theory that the best page to remove is the one that has been in memory the longest.
A. TRU B. LRU C. LIFO D. FIFO