• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

When performing a vulnerability scan of a target, how can adverse impacts on traversed devices be minimized?

  • The scan should be performed as close to the target as possible. 
  • Unauthenticated vulnerability scans should be performed. 
  • Only passive reconnaissance scans should be performed. 
  • Scanning policy options should include query throttling.

Explanation & Hint:

To eliminate impacting devices that the scanner traffic is traversing and to ensure that these devices do not affect the scan results, the scan should be performed as close to the target as possible.

For more Questions and Answers:

3.5.3 Quiz – Information Gathering and Vulnerability Scanning Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments