O'Reilly logo

CompTIA PenTest+ Study Guide by David Seidl, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4Vulnerability Scanning

THE COMPTIA PENTEST+ EXAM OBJECTIVES COVERED IN THIS CHAPTER INCLUDE:

Domain 2: Information Gathering and Vulnerability Identification

  • images 2.2 Given a scenario, perform a vulnerability scan.
    • Credentialed vs. non-credentialed
    • Types of scans
      • Discovery scan
      • Full scan
      • Stealth scan
      • Compliance scan
    • Container security
    • Application scan
      • Dynamic vs. static analysis
    • Considerations of vulnerability scanning
      • Time to run scans
      • Protocols used
      • Network topology
      • Bandwidth limitations
      • Query throttling
      • Fragile systems/non-traditional assets
  •  2.5 Explain weaknesses related to specialized systems.
    • Application containers

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required