Types of Vulnerability Scans that Can Cause System Outage

Types of Vulnerability Scans that Can Cause System Outage

Prev Question Next Question

Question

A new security administrator ran a vulnerability scanner for the first time and caused a system outage.

Which of the following types of scans MOST likely caused the outage?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

Based on the scenario described, the most likely type of scan that caused the system outage is an intrusive non-credentialed scan.

Explanation:

Vulnerability scanners are used to identify vulnerabilities in systems, applications, and network devices. Scans can be categorized as either intrusive or non-intrusive and credentialed or non-credentialed.

Non-intrusive scans are those that don't actively try to exploit vulnerabilities or disrupt services on the target system. These scans are usually safer to perform and cause minimal impact on the system being scanned.

On the other hand, intrusive scans attempt to exploit vulnerabilities and can cause service disruptions, system crashes, or even data loss if not properly performed.

Credentialed scans, also known as authenticated scans, require valid login credentials for the target system or application to scan for vulnerabilities. This type of scan is usually more thorough and accurate as it has access to the system's configuration and installed software.

Non-credentialed scans, also known as unauthenticated scans, do not require login credentials and rely on network scanning techniques to identify vulnerabilities. This type of scan is usually less accurate and less comprehensive, but it can still provide valuable information.

Therefore, based on the given scenario, an intrusive non-credentialed scan is the most likely culprit for the system outage. This type of scan attempts to exploit vulnerabilities without valid login credentials, which can cause service disruptions or system crashes.

It's important to note that performing intrusive scans without proper authorization and testing can be illegal and unethical. Therefore, security administrators should always obtain proper authorization and perform thorough testing before conducting any type of vulnerability scan.