• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

What is required for a penetration tester to conduct a comprehensive authenticated scan against a Linux host?

  • user credentials with root-level access to the target system 
  • system user credentials 
  • physical on-premises access to the target system 
  • unauthenticated scans are a form of passive reconnaissance that return little useful information. 
  • backdoor access to the target system

Explanation & Hint:

When conducting an authenticated scan against a target, many of the commands that the scanner runs require root-level access to gather the correct and most complete information from the system; system user credentials would only provide access to resources for which that user has privilege. An authenticated scan against a target does not have to be conducted on-premises; remote SSH access is typically used.

For more Questions and Answers:

3.5.3 Quiz – Information Gathering and Vulnerability Scanning Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments