An attacker first collects a list of potentially vulnerable machines and then scans them to find vulnerable machines

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

An attacker first collects a list of potentially vulnerable machines and then scans them to find vulnerable machines

Explanation:
Targeted vulnerability scanning is what’s being described: the attacker first builds a list of hosts that are likely to be vulnerable and then runs scans only against that set to identify weaknesses. This hit-list approach makes the process efficient, concentrating effort where it’s most likely to pay off and reducing noise and time spent on unreachable or unlikely targets. If you were scanning without a preselected list, you’d be doing random scanning—casting a wide net across many addresses, which is slower, louder, and easier to detect. Permutation scanning changes the order of scanning within a space to avoid patterns, but it still involves scanning a broad range rather than starting from a focused target list. Central Source Propagation refers to how malware spreads from a central node, not to how targets are selected for vulnerability assessment.

Targeted vulnerability scanning is what’s being described: the attacker first builds a list of hosts that are likely to be vulnerable and then runs scans only against that set to identify weaknesses. This hit-list approach makes the process efficient, concentrating effort where it’s most likely to pay off and reducing noise and time spent on unreachable or unlikely targets.

If you were scanning without a preselected list, you’d be doing random scanning—casting a wide net across many addresses, which is slower, louder, and easier to detect. Permutation scanning changes the order of scanning within a space to avoid patterns, but it still involves scanning a broad range rather than starting from a focused target list. Central Source Propagation refers to how malware spreads from a central node, not to how targets are selected for vulnerability assessment.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy