• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

In which circumstance would a penetration tester perform an unauthenticated scan of a target?

  • when user credentials were not provided 
  • when the number of false positive vulnerability reports is not required 
  • when time is limited and faster scans are required 
  • when only targets with UDP services are to be scanned

Explanation & Hint:

Unauthenticated vulnerability scans do not use credentials to scan a target, so they are more likely to be used when a user or root-level credentials are unavailable or unknown.

For more Questions and Answers:

3.5.3 Quiz – Information Gathering and Vulnerability Scanning Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments