Page 1088 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1088
FIGURE 15.3 Nmap scan of a large network run from a Mac system
using the Terminal utility
Network Vulnerability Scanning
Network vulnerability scans go deeper than discovery scans. They
don’t stop with detecting open ports but continue on to probe a
targeted system or network for the presence of known vulnerabilities.
These tools contain databases of thousands of known vulnerabilities,
along with tests they can perform to identify whether a system is
susceptible to each vulnerability in the system’s database.
When the scanner tests a system for vulnerabilities, it uses the tests in
its database to determine whether a system may contain the

