You are responsible for application security for a small startup. You are responsible for conducting regular penetration tests. Recently the startup has faced some budget issues and lacks the funds to create a stand alone system to be used for vulnerability scanning applications. Due to this constraint you must conduct vulnerability scans on the live system (the same one being used by customers). What type of scan should be used to ensure vulnerabilities are found but not executed?

  • intrusive
  • non-intrusive
  • credentialed
  • non-credentialed

Your Score:
Threats, Attacks and Vulnerabilities
Technologies and Tools
Architecture and Design
Identity and Access Management
Risk Management
Cryptography and PKI
CompTIA Security+ SY0-501
  • Threats, Attacks and Vulnerabilities
    • This question is filed here
  • Technologies and Tools
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
  • Cryptography and PKI