When performing a vulnerability scan of a target, how can adverse impacts on traversed devices be minimized?
- Unauthenticated vulnerability scans should be performed.
- Only passive reconnaissance scans should be performed.
- The scan should be performed as close to the target as possible.
- Scanning policy options should include query throttling.
Explanation: To eliminate impacting devices that the scanner traffic is traversing and to ensure that these devices do not affect the scan results, the scan should be performed as close to the target as possible.
Exam with this question: 3.5.3 Quiz - Information Gathering and Vulnerability Scanning Answers
Please login or Register to submit your answer