Chapter 4Vulnerability Scanning

THE COMPTIA PENTEST+ EXAM OBJECTIVES COVERED IN THIS CHAPTER INCLUDE:

Domain 2: Information Gathering and Vulnerability Identification

  • images 2.2 Given a scenario, perform a vulnerability scan.
    • Credentialed vs. non-credentialed
    • Types of scans
      • Discovery scan
      • Full scan
      • Stealth scan
      • Compliance scan
    • Container security
    • Application scan
      • Dynamic vs. static analysis
    • Considerations of vulnerability scanning
      • Time to run scans
      • Protocols used
      • Network topology
      • Bandwidth limitations
      • Query throttling
      • Fragile systems/non-traditional assets
  •  2.5 Explain weaknesses related to specialized systems.
    • Application containers

Get CompTIA PenTest+ Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.