When performing a vulnerability scan of a target, how can adverse impacts on traversed devices be minimized?

IT Questions BankCategory: Ethical HackerWhen performing a vulnerability scan of a target, how can adverse impacts on traversed devices be minimized?

When performing a vulnerability scan of a target, how can adverse impacts on traversed devices be minimized?

  • Unauthenticated vulnerability scans should be performed.
  • Only passive reconnaissance scans should be performed.
  • The scan should be performed as close to the target as possible.
  • Scanning policy options should include query throttling.

Explanation: To eliminate impacting devices that the scanner traffic is traversing and to ensure that these devices do not affect the scan results, the scan should be performed as close to the target as possible.

Exam with this question: 3.5.3 Quiz - Information Gathering and Vulnerability Scanning Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments