O'Reilly logo

CompTIA PenTest+ Study Guide by David Seidl, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5Analyzing Vulnerability Scans

THIS CHAPTER COVERS THE FOLLOWING COMPTIA PENTEST+ EXAM OBJECTIVES:

Domain 2: Information Gathering and Vulnerability Identification

  • images 2.3 Given a scenario, analyze vulnerability scanning results.
    • Asset categorization
    • Adjudication
      • False positives
    • Prioritization of vulnerabilities
    • Common themes
      • Vulnerabilities
      • Observations
      • Best Practices
  • images 2.5 Explain weaknesses related to specialized systems.
    • ICS
    • SCADA
    • Mobile
    • IoT
    • Embedded
    • Point-of-sale system
    • Application containers
    • RTOS

Domain 4: Penetration Testing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required