When performing a vulnerability scan of a target, how can adverse impacts on traversed devices be minimized?
- The scan should be performed as close to the target as possible.
- Unauthenticated vulnerability scans should be performed.
- Only passive reconnaissance scans should be performed.
- Scanning policy options should include query throttling.
Explanation & Hint: To eliminate impacting devices that the scanner traffic is traversing and to ensure that these devices do not affect the scan results, the scan should be performed as close to the target as possible.
|