Chapter 14 Flashcards
1
Q
A process that uses a specifically designed tool to scan for vulnerabilities
A
Vulnerability Assessment
2
Q
A scan that is conducted using a valid set of credentials, generally administrative, for the system being scanned
A
Authenticated Scans
3
Q
Scans that don’t require any credentials for the host you’re scanning or any access other than network connectivity to the host in question
A
Unauthenticated Scans
4
Q
The process of testing a system for vulnerabilities that an attacker could exploit
A
Penetration testing (Pentesting/Ethical Hacking)