Vulnerability Scans Flashcards
1
Q
Credentialed vs Non-Credentialed (Vulnerability Scan)
A
Credentialed * scanner uses an authorized user or admin account * closer to system admin perspective * deeper scan, more vulnerabilities Non Credentialed * scanner without admin account * closer to hacker perspective
2
Q
Discovery Scan (Vulnerability Scan)
A
- least intrusive (like ping sweep)
* used to create entwork map to show connected devices in architecture
3
Q
Full Scan (Vulnerability Scan)
A
- in depth scan including port, services and vulnerabilities
* easy to see in network traffic when performed
4
Q
Stealth Scan (Vulnerability Scan)
A
- scans by sending SYN packet and then analyzing the response
- if SYN/ACK is received, destination is trying to establish the connection (port is open) and scanner sends RST packet
5
Q
Compliance Scan (Vulnerability Scan)
A
- identify vulnerabilities that may affect compliance with regulations
- commonly setup as a scanning template in vulnerability scanner (like PCI DSS)