Vulnerability Scans: Common Practices and Importance | CompTIA Security+

Commonly Performed Steps in Vulnerability Scans

Prev Question Next Question

Question

Which of the following is commonly done as part of a vulnerability scan?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

The correct answer is D. Identifying unpatched workstations.

A vulnerability scan is a process of identifying vulnerabilities, weaknesses, and potential threats in a network or system. The purpose of a vulnerability scan is to detect vulnerabilities before an attacker can exploit them.

Exploiting misconfigured applications, cracking employee passwords, and sending phishing emails to employees are examples of activities that an attacker might perform during a penetration test, but they are not part of a vulnerability scan. These activities are more invasive and may cause harm to the system or network.

Identifying unpatched workstations is a critical aspect of a vulnerability scan. Unpatched workstations may have known vulnerabilities that an attacker could exploit. A vulnerability scanner can identify these vulnerabilities, provide information about their severity, and recommend actions to mitigate the risks.

In summary, vulnerability scans are a crucial security measure that organizations should perform regularly. The scan aims to identify vulnerabilities and weaknesses in the system or network. The scan results help to prioritize security patches, upgrades, and remediation efforts, ensuring that the system or network remains secure against potential attacks.