Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- To find a vulnerability, an attacker sends probes and fabricated requests to a target. What type of scanning is this?
- Passive scanning
- Active scanning
- Flooding
- Man-in-the-middle
- To identify hosts and vulnerabilities, which type of assessment is used?
- Distributed
- Passive
- Active
- Automated
- Which vulnerability assessment solution is said to be placed in private or corporate resources?
- Service-based
- Inference-based
- Product-based
- Tree-based
- What kind of scanner is used when the location and data from a scan are stored on a single system?
- Cluster-based
- Proxy-based
- Network-based
- Agent-based