Which type of scanning checks for known weaknesses to determine if a system is exploitable?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which type of scanning checks for known weaknesses to determine if a system is exploitable?

Explanation:
Vulnerability scanning focuses on identifying known weaknesses that could be exploited. It checks systems against catalogs of known flaws (such as CVEs) and insecure configurations to see if patches are missing, credentials are weak or default, or services are misconfigured. Finding these weaknesses helps determine if an attacker could actually exploit the system. Network scanning, by contrast, is about discovering which hosts are reachable and which ports or services are open, not whether those services have known flaws. The terms SYN and ACK refer to TCP handshake steps used in certain port-scanning techniques, not to assessing exploitability. So scanning for known weaknesses that could be exploited is the vulnerability scanning approach.

Vulnerability scanning focuses on identifying known weaknesses that could be exploited. It checks systems against catalogs of known flaws (such as CVEs) and insecure configurations to see if patches are missing, credentials are weak or default, or services are misconfigured. Finding these weaknesses helps determine if an attacker could actually exploit the system.

Network scanning, by contrast, is about discovering which hosts are reachable and which ports or services are open, not whether those services have known flaws. The terms SYN and ACK refer to TCP handshake steps used in certain port-scanning techniques, not to assessing exploitability. So scanning for known weaknesses that could be exploited is the vulnerability scanning approach.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy