Domain 1.5 - Explain vulnerability scanning concepts. Flashcards
Intrusive testing
Involve actually trying to break into the network. Does not take up a lot of resources. (vulnerability scan)
Non-Intrusive tests
Involves passively testing of security controls—performing vulnerability scans and probing for weaknesses but not exploiting them. Takes a lot of resources.
What is a vulnerability Scan?
Vulnerability scan is a passive attempt to identify weaknesses.
What is Nessus?
A popular vulnerability Scanning software
Credentialed or authenticated scan
Uses actual network credentials to connect to systems and scan for vulnerabilities.
Non-credentialed Or Unauthenticated scan
Although unauthenticated scans will show weaknesses in your perimeter, it will not show you what the attacker will exploit once breaching your perimeter
Benefits of unauthenticated scanning
– Not disrupting operations or consuming too many resources
– Definitive list of missing patches
– Client-side software vulnerabilities
False positive
Occurs when the scan mistakenly identifies something as a vulnerability when it is not
Which of the following types of vulnerability scans uses actual network authentication to connect to systems and scan for vulnerabilities?
A. Credentialed
B. Validated
C. Endorsed
D. Confirmed
A. Credentialed
False Negative
when a scan does not reveal a vulnerability that is there.