4.2. Carry out vulnerability assessments using common tools.
Vulnerability assessments are used to discover weaknesses in deployed security systems in order to improve or repair them before a breach occurs. By using a wide variety of assessment tools, security administrators can learn of deficiencies quickly. Only through vigilance and constant monitoring and assessment can a security endeavor prove successful.
NOTE
For more information on this topic, see Chapter 3 of the CompTIA Security+ Study Guide, 4th Edition (Sybex, November 2008).
4.2.1. Port scanners
A port scanner is a vulnerability assessment tool that sends probe or test packets to a target system's ports in order to learn about the status of those ports. A port can be in one of ...
Get CompTIA Security+™: Review Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.