Vulnerability Scanning Tools and Techniques Flashcards
Which parameter can be used with the nmap command to detect the operating system of a host on the network?
A. -sV
B. -A
C. -O
D. -p
C. -O
The -O parameter can be used with the nmap command to determine a host on the network’s operating system. The other commands listed can not be used for this purpose
Which of the following applications can be used to detect hosts on the network?
A. ssh
B. nmap
C. dnf
D. wget
B. nmap
The nmap application can be used to detect available hosts on the network. The wget, ssh and dnf are command line tools and cannot be used for this purpose.
Which application can be used to detect web application vulnerabilities?
A. Nessus
B. zenmap
C. OWASP ZAP
D. nmap
C. OWASP ZAP
The OWASP ZAP application can be used to detect web application vulnerabilities. The nmap, zenmap and Nessus applications can not be used for this purpose.
What can the Nessus application be used for?
A. Detect misconfigured policies
B. Detect misconfigured devices
C. Detect hosts on the network
D. Detect web application vulnerabilities
C. Detect hosts on the network
The Nessus application can be used to detect hosts on the network. The application can not be used to detect web application vulnerabilities, misconfigured devices or policies.