Chapter 5Analyzing Vulnerability Scans

THIS CHAPTER COVERS THE FOLLOWING COMPTIA PENTEST+ EXAM OBJECTIVES:

Domain 2: Information Gathering and Vulnerability Identification

  • images 2.3 Given a scenario, analyze vulnerability scanning results.
    • Asset categorization
    • Adjudication
      • False positives
    • Prioritization of vulnerabilities
    • Common themes
      • Vulnerabilities
      • Observations
      • Best Practices
  • images 2.5 Explain weaknesses related to specialized systems.
    • ICS
    • SCADA
    • Mobile
    • IoT
    • Embedded
    • Point-of-sale system
    • Application containers
    • RTOS

Domain 4: Penetration Testing ...

Get CompTIA PenTest+ Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.