What is vulnerability scanning, and what are the two different types of vulnerability scans?

What will be an ideal response?


ANSWER: Vulnerability scanning is used to identify vulnerabilities in a network. It's often performed by a company's own staff, and does not attempt to exploit any vulnerabilities. Vulnerability scanning might also be the first step in other attack simulations or in a real attack. During attack simulations, there are two types of vulnerability scans:
* authenticated-In this case, the attacker is given the same access to the network as a trusted user would have, such as an employee or an intruder who has somehow hacked into a user's account.
* unauthenticated-In this case, the attacker begins on the perimeter of the network, looking for vulnerabilities that do not require trusted user privileges.

Computer Science & Information Technology

You might also like to view...

In a binary search tree each item has a uniquely valued data component called a(n) _____________________

What will be an ideal response?

Computer Science & Information Technology

The y-axis on a chart is also known as the ________ axis

Fill in the blank(s) with correct word

Computer Science & Information Technology

Format Painter enables you to copy formatting from one worksheet cell to another without copying the cell's contents.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ____ page replacement policy is based on the theory that the best page to remove is the one that has been in memory the longest.

A. TRU B. LRU C. LIFO D. FIFO

Computer Science & Information Technology