1. Components of an ActiveVulnerability Scan consist of:A policy, credentials,scan zone, schedule, , and . Answer: Repository and Target List 2. are administrative level usernames and passwords used in authenticated scans? Answer: Credentials 3. True/False:You can associate multiple credentials with a single scan Answer: True 4. Networks using DHCP require what Active Scan setting be enabled toproperly track hosts Answer: Track hosts which have been issued new IP addresses 5. Which type ofscan obtainsinformation by authenticating to the host accessresources not available over the network Answer: Credentialed 6. True/False:You may only select one import repository per scan Answer: True 7. True/False: Once a scan is running, you cannot pause or stop it until it iscompleted Answer: False 8. Which Port Scanning Range option tells the scanner to scan only commonports? Answer: Default 9. In a low-bandwidth environment, which options might you adjust to try toimprove scanning performance? Answer: Max Simultaneous Checks Per Host and MaxSimultaneous Hosts Per Scan
Category | exam bundles |
Comments | 0 |
Rating | |
Sales | 0 |