Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Question
Book Icon
Chapter 7, Problem 17RQ
Program Plan Intro

Vulnerability scanner:

  • Vulnerability scanner is a software program or network appliance that is used to scan the wide range of address present in the network along with their port numbers to avail open services.
  • A form of software application that is designed to validate and monitor the network ports that is available open for different services.
  • Vulnerability scanner is of two types and they are listed below:
    • Active vulnerability scanner.
    • Passive vulnerability scanner.
  • They are used in identifying and detect the vulnerabilities present in the network.
  • It is used in scanning and obtaining the security holes that are present in operating system, network that is open with configuration problem and also the username and password that are exposed.

Blurred answer
Students have asked these similar questions
What makes active and passive vulnerability scanners different?
When it comes to vulnerability scanners, what is the difference between active and passive scanners?
So, in terms of vulnerability scanning, what precisely is the distinction between active and passive vulnerability scanners?
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning