1.5 Vulnerability scanning concepts Flashcards
1
Q
Passively test security controls
A
Vulnerability scan, non intrusive.
2
Q
Intrusive vs. non-intrusive
A
Non-intrusive: purely passive techniques on a session or agent. ex. vulnerability scanners.
Intrusive: An exploitation framework uses vulnerabilities identified by a scanner and launches scripts to attempt to exploit them.
3
Q
Credentialed vs. non-credentialed
A
Credentialed: given a user account with logon rights.
Non-credentialed: proceeds without being able to logon.
4
Q
Vulnerability Scanner
A
Examines an organization’s systems, applications, and devices and compares the scan results to configuration templates plus lists of known vulnerabilities.