Vulnerability scanners, Computer Network Security

VULNERABILITY SCANNERS

Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames and groups which are exposed, shows open network shares and exposes configuration and other vulnerabilities in servers.

A passive vulnerability scanner listens in on network and determines vulnerable versions of server and client software both. Passive vulnerability scanners have ability to find client side vulnerabilities that are not found in active scanners.

Posted Date: 10/9/2012 4:06:51 AM | Location : United States







Related Discussions:- Vulnerability scanners, Assignment Help, Ask Question on Vulnerability scanners, Get Answer, Expert's Help, Vulnerability scanners Discussions

Write discussion on Vulnerability scanners
Your posts are moderated
Related Questions
QUESTION a) Consider the speed of propagation of an electrical signal is same to 2x10 8 m/s, evaluate the ratio of the propagation delay to the transmit time for the given typ

Ask question #Minimum 100 words acceptwwwed#

Question : Environmental Accounting is a means for businesses to fulfill their responsibilities for accountability to stakeholders. (a) What do you understand by Environment

Who are the individuals who cause these security problems? Many unauthorized people who cause network security problems for obtaining information about the other users and causi

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

Problem (a) Give two reasons for companies to implement security measures. (b) What is the regulatory expectation regarding i. healthcare information, ii. financial

QUESTION a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a segment. Give the source MAC address in hexadecimal; the source IP address, the uppe