Vulnerability Scans Flashcards

1
Q

Credentialed vs Non-Credentialed (Vulnerability Scan)

A
Credentialed
* scanner uses an authorized user or admin account
* closer to system admin perspective
* deeper scan, more vulnerabilities
Non Credentialed
* scanner without admin account
* closer to hacker perspective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discovery Scan (Vulnerability Scan)

A
  • least intrusive (like ping sweep)

* used to create entwork map to show connected devices in architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Full Scan (Vulnerability Scan)

A
  • in depth scan including port, services and vulnerabilities

* easy to see in network traffic when performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stealth Scan (Vulnerability Scan)

A
  • scans by sending SYN packet and then analyzing the response
  • if SYN/ACK is received, destination is trying to establish the connection (port is open) and scanner sends RST packet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compliance Scan (Vulnerability Scan)

A
  • identify vulnerabilities that may affect compliance with regulations
  • commonly setup as a scanning template in vulnerability scanner (like PCI DSS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly