CHAPTER 4

Vulnerability Assessment Tools

This chapter includes questions on the following topics:

•  When and how you might use different tools and technologies

•  How to choose among similar tools and technologies

•  How to review and interpret results of vulnerability scan reports

•  Vulnerability assessment tools for specialized environments

Fixing a hole is far more effective than trying to hide it. That approach is also less stressful than constantly worrying that attackers may find the vulnerabilities.

–Gordon Fyodor Lyon

Cybersecurity analysts rely heavily upon tools to perform their tasks. Currently, the increasing complexity of networks and the explosion of devices connected to the network present near insurmountable challenges ...

Get CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.