Vulnerability scanners, Computer Network Security

VULNERABILITY SCANNERS

Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames and groups which are exposed, shows open network shares and exposes configuration and other vulnerabilities in servers.

A passive vulnerability scanner listens in on network and determines vulnerable versions of server and client software both. Passive vulnerability scanners have ability to find client side vulnerabilities that are not found in active scanners.

Posted Date: 10/9/2012 4:06:51 AM | Location : United States







Related Discussions:- Vulnerability scanners, Assignment Help, Ask Question on Vulnerability scanners, Get Answer, Expert's Help, Vulnerability scanners Discussions

Write discussion on Vulnerability scanners
Your posts are moderated
Related Questions
Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG


Dynamic Packet Filtering Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

A Network is described as a system for connecting computers using a single transmission technology. The computers can interact with each other in a network. They can receive an

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

UDP COMMUNICATION SEMANTICS:  UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs