answersLogoWhite

0


Best Answer

an attempt to find and attack a site that has hardware or software that is vulernable to a specific exploit

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is a Vulnerability scan attack?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is vulnerability scans?

Its a scan that scans for vulnerabilities that you need to fix or it may harm your computer. If you have Kaspersky Lab 2013, it has a vulnerability scan so you can scan for those vulnerabilities.(I have Kaspersky Lab 2013)


What is a vulnerability scan?

A vulnerability scan is the automated process of proactively identifying vulnerabilities of software and computing systems in a network to determine if and where a system or network can be exploited and/or threatened. Vulnerability scanning usually employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to improve the network's overall security posture. The primary goal of a vulnerability scan is to reduce the vulnerability of a software application, a database, a computer, or a network of computers to hacking, denial of service, infection, and other security risks.


Why do you need to run both Zenmap GUI and Nessus to perform the first three steps of the hacking process?

Nessus is used to perform a vulnerability scan during a hacking attack. Zenmap GUI is used to do fingerprinting and port scanning.


What kind of attack is used in exploiting a vulnerability in which no patch is yet available from the system vendor?

Zero-Day Attack


What kind of attack has Intruders exploiting a vulnerability in which no patch is yet available from the system vendor?

zero-day attack


Select the factor that will NOT help you avoid becoming the victim of a terrorist attack. (Introduction to Antiterrorism Page 4) Vulnerability Location Opportunity Association?

vulnerability


Attack takes advantages of vulnerabilities that have not been revealed?

quick vulnerability assessment (QVA)


What are examples of Japan's vulnerability to allied air attack in late 1944?

Paper houses firebombed


Intruders exploring a vulnerability in which no patch is yet available for system vendor?

Social Engineering attack


Why did the doolittle raid alarm japanese leaders?

The raid had shown to the Japanese the vulnerability of Japan to aerial attack .


What kind of attack takes advantage of vulnerabilities that have not been previously revealed?

quick vulnerability assessment (QVA)


Who bombers under the command bombed in Tokyo demonstrated Japan's vulnerability to the air attack?

James Doolittle