A cybersecurity analyst has been tasked to perform a vulnerability assessment for a company with the requirement that it should mimic the perspective of an external attacker. The company hosts a web application that is accessible to the public. Which of the following methods is BEST suited to meet the stated requirement and yield the most relevant results?
Performing an uncredentialed external scan of the web-facing application.
Running an active internal scan with agentless in-depth checks on all devices.
Executing a passive internal scan using network-sniffing tools.
Conducting a credentialed scan from within the organization's network.
Performing an uncredentialed external scan is the most suitable option for mimicking the perspective of an external attacker. Credentialed scans are typically used for internal assessments to provide deeper insights with authenticated access. External scans are conducted from outside the organization's network perimeter, which best replicates how an attacker might attempt to discover vulnerabilities without any internal privileges.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a credentialed scan and an uncredentialed scan?
Open an interactive chat with Bash
What is the purpose of an external vs internal vulnerability scan?
Open an interactive chat with Bash
Why are passive scans different from active scans, and when would you use them?