Vulnerability Scan Types

Vulnerability Scans

Prev Question Next Question

Question

A vulnerability scan is being conducted against a desktop system.

The scan is looking for files, versions, and registry values known to be associated with system vulnerabilities.

Which of the following BEST describes the type of scan being performed?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

The type of scan being performed in this scenario is a credentialed scan.

A vulnerability scan is a security testing technique used to identify vulnerabilities in a system or network. This type of scan typically involves automated tools that look for known vulnerabilities in software, configurations, and other system components.

Credentialed scanning is a type of vulnerability scan that uses privileged credentials, such as administrative usernames and passwords, to access the system being scanned. This allows the scanner to perform a more thorough analysis of the system, including identifying vulnerabilities that may not be visible from an external perspective.

In contrast, non-intrusive scans are typically performed from an external perspective and do not involve privileged access to the system being scanned. Non-intrusive scans can be useful for identifying potential vulnerabilities, but they may not provide a complete picture of the system's security posture.

Authenticated scanning involves providing login credentials to the system being scanned, but it does not necessarily require privileged credentials. Authenticated scanning can provide more information than a non-intrusive scan but less than a credentialed scan.

Active scans involve actively probing the system being scanned and can potentially cause disruptions or downtime. In contrast, passive scans do not involve actively probing the system and are less likely to cause disruptions.

In summary, a credentialed scan is the best description of the type of scan being performed in this scenario, as it involves using privileged credentials to access the system and identify vulnerabilities that may not be visible from an external perspective.