You are responsible for the security of a web application that handles sensitive financial data. To ensure comprehensive coverage and compliance, which type of vulnerability scan would be BEST to detect security issues that may be exposed to attackers on the internet?
External scanning is the most suitable choice for detecting vulnerabilities that could be exploited by attackers over the internet. This type of scan focuses on discovering weaknesses from the perspective of an external attacker and can help you address any issues before they are discovered and exploited. Internal scans, while also important, focus on threats within the network and are less likely to uncover vulnerabilities that can be exploited from the internet. Credentialed scans provide more detailed reports but are usually used internally to assess specific configurations and patches. Passive scans, while useful for low-impact monitoring, do not actively probe for vulnerabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an external scanning vulnerability assessment?
Open an interactive chat with Bash
What are the differences between internal and external scans?