Page 1088 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1088

FIGURE 15.3 Nmap scan of a large network run from a Mac system

               using the Terminal utility


               Network Vulnerability Scanning

               Network vulnerability scans go deeper than discovery scans. They
               don’t stop with detecting open ports but continue on to probe a
               targeted system or network for the presence of known vulnerabilities.
               These tools contain databases of thousands of known vulnerabilities,
               along with tests they can perform to identify whether a system is
               susceptible to each vulnerability in the system’s database.

               When the scanner tests a system for vulnerabilities, it uses the tests in

               its database to determine whether a system may contain the
   1083   1084   1085   1086   1087   1088   1089   1090   1091   1092   1093