Match the network security testing technique with how it is used to test network security. (Not all options are used.)

IT Questions BankCategory: CCNA CyberOpsMatch the network security testing technique with how it is used to test network security. (Not all options are used.)
Match the network security testing technique with how it is used to test network security. (Not all options are used.) 1ITExamAnswers Staff asked 11 months ago

Match the network security testing technique with how it is used to test network security. (Not all options are used.)

Match the network security testing technique with how it is used to test network security. (Not all options are used.) 2

  • Penetration testing = used to determine the possible consequences of successful attacks on the network.
  • Vulnerability scanning = used to find weaknesses and misconfigurations on network systems.
  • Network scanning = used to discover available resources on the network.

Explanation: Network scanning tools are used to probe network devices, servers and hosts for open TCP or UDP ports. Vulnerability scanning tools are used to discover security weaknesses in a network or computer system. Penetration testing tools are used to determine the possible outcome of a successful attack on a network or computer system.

More Questions: CCNA Security Pretest Exam Answers
More Questions: CCNA Cyber Ops (v1.1) – Chapter 6 Exam Answers
More Questions: CyberOps Associate (Version 1.0) – CyberOps Associate 1.0 Practice Final exam
More Questions: CCNA Security Final Exam Answers


Related Articles

guest
0 Comments
Inline Feedbacks
View all comments