Chapter 14 Flashcards

1
Q

A process that uses a specifically designed tool to scan for vulnerabilities

A

Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A scan that is conducted using a valid set of credentials, generally administrative, for the system being scanned

A

Authenticated Scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scans that don’t require any credentials for the host you’re scanning or any access other than network connectivity to the host in question

A

Unauthenticated Scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of testing a system for vulnerabilities that an attacker could exploit

A

Penetration testing (Pentesting/Ethical Hacking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly