Free CompTIA PenTest+ PT0-002 Practice Question

During a vulnerability assessment, you identify several devices on the network, including switches, routers, and firewalls. What method should you employ to comprehensively identify potential vulnerabilities on these network devices while minimizing risks to their operational stability?

  • Credentialed scan

  • Non-credentialed scan

  • Stealth scan

  • TCP connect scan

This question's topic:
CompTIA PenTest+ PT0-002 / 
Information Gathering and Vulnerability Scanning
Your Score:

Check or uncheck an objective to set which questions you will receive.