<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Different Vulnerability scan and pertest in CISSP Study Group</title>
    <link>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61657#M898</link>
    <description>&lt;P&gt;During preparation to CISSP I got this question:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Determining patch levels, improper services, and improper configurations is an attribute of which of the following?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The answers could be&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Risk assessing&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Vulnerability scanning&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Penetration testing&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Business impact analysis&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I would take penitent, because I got this independent information from a pentest, but it is the vulnerability scanning. I miss the database with known vulnerabilities which is used to test again the findings.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have an explanation why it is vulnerability scan?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 10:41:58 GMT</pubDate>
    <dc:creator>OliLue</dc:creator>
    <dc:date>2023-10-09T10:41:58Z</dc:date>
    <item>
      <title>Different Vulnerability scan and pertest</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61657#M898</link>
      <description>&lt;P&gt;During preparation to CISSP I got this question:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Determining patch levels, improper services, and improper configurations is an attribute of which of the following?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The answers could be&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Risk assessing&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Vulnerability scanning&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Penetration testing&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Business impact analysis&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I would take penitent, because I got this independent information from a pentest, but it is the vulnerability scanning. I miss the database with known vulnerabilities which is used to test again the findings.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have an explanation why it is vulnerability scan?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:41:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61657#M898</guid>
      <dc:creator>OliLue</dc:creator>
      <dc:date>2023-10-09T10:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Different Vulnerability scan and pertest</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61674#M900</link>
      <description>This is Vulnerability scanning as it looks for all issues that could be exploited on a system or network. There are many possible issues but it covers all of them and provides a report on patch, version, mis-configuration, non- supported components, license issues etc. A vulnerability scan seeks to enumerate issues but never to actually exploit then - pen testers are always trying to get root on a box or system without being caught under the terms of their contract with customer. So in short VS wide BAU process to see what you need to fix, whilst pen testing is basically having an ethical hacker attack your systems in a controlled way and seeing if they can breach your security.</description>
      <pubDate>Tue, 15 Aug 2023 01:58:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61674#M900</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2023-08-15T01:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: Different Vulnerability scan and pertest</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61681#M901</link>
      <description>&lt;P&gt;Vulnerability scanning is about identifying vulnerabilities/weaknesses (based on a vulnerability database).&amp;nbsp;A penetration test attempts (based on a vulnerability scan) to exploit detected vulnerabilities.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best, Thomas&lt;/P&gt;</description>
      <pubDate>Tue, 15 Aug 2023 09:58:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61681#M901</guid>
      <dc:creator>neeff</dc:creator>
      <dc:date>2023-08-15T09:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: Different Vulnerability scan and pertest</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61686#M903</link>
      <description>&lt;P&gt;Think of it this way. That pentest undoubtedly will contain a vulnerability scan but not the other way around. Why is it useful to make that distinction? It's a little more than semantics. A vulnerability scan/assessment just tells you what is vulnerable. It doesn't look to exploit it. So if you're contracting for services or are concerned about liability, the vulnerability scan can tell you a lot without going overboard. That said, we now see legal disclaimers, terms of use, and even regulations that prohibit scanning a network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Arguably, there's also a slightly different objective. A vulnerability scan should be comprehensive - I want to throw a very wide net in terms of what's vulnerable. A pentest looks more to see what is exploitable. You can have a vulnerability that isn't exploitable (yet) or might not be a high-value target. Conversely, a pentest might focus on a high-value target, even one without a technical vulnerability. Example: using spearphishing against someone with administrative access.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Aug 2023 12:50:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61686#M903</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2023-08-15T12:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: Different Vulnerability scan and pertest</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61701#M904</link>
      <description>Thanks, I understand the point of view and understand the answer</description>
      <pubDate>Tue, 15 Aug 2023 16:30:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61701#M904</guid>
      <dc:creator>OliLue</dc:creator>
      <dc:date>2023-08-15T16:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: Different Vulnerability scan and pertest</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61702#M905</link>
      <description>Great. I understand the point</description>
      <pubDate>Tue, 15 Aug 2023 16:30:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61702#M905</guid>
      <dc:creator>OliLue</dc:creator>
      <dc:date>2023-08-15T16:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: Different Vulnerability scan and pertest</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61706#M906</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To my understanding, the attributes given in the question i.e. the patch level, improper services or improper configurations are more related to the identification of weaknesses of the current status in a system which can be identified by doing a vulnerability scan. It is not just against a known database, but it would also identify the weaknesses against the expected baselines - hence the improper services or configurations or patch levels. The vulnerability database could contain the list of exploits to an application or process behaviour at runtime but may not be suggestive for the baselines.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Penetration Testing, on the other hand, is more of an attempt to break through the application's runtime environment and gain access to data for manipulation / destruction.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The very purpose of the two activities differ.&lt;/P&gt;&lt;P&gt;Hope you find this useful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Aug 2023 18:27:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/61706#M906</guid>
      <dc:creator>SanjeevK</dc:creator>
      <dc:date>2023-08-15T18:27:16Z</dc:date>
    </item>
    <item>
      <title>Re: Different Vulnerability scan and pertest</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/64051#M983</link>
      <description>&lt;P&gt;I recall pulling my hair out (an expression, not literal) over a similar question on another exam.&lt;/P&gt;&lt;P&gt;I appreatiate the answers!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will add....&lt;/P&gt;&lt;P&gt;If a manager was to ask for reports on patches levels and improper configurations it would be 100% overkill, poor value for money and a risk to start pentesting when an automated process can get you the answer and be much much quicker.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;...but the answers above are from people better than me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hate these types of questions, it would have been "better" (IMO) to say "If the CEO wants to have regular reports on ....., which process would you employ".Maybe this is one of those questions when they are testing you with a business leader hat and not an IT hat. In fact with this in mind, maybe the question is fine as is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2023 17:34:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/64051#M983</guid>
      <dc:creator>JohnEricsson</dc:creator>
      <dc:date>2023-10-31T17:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: Different Vulnerability scan and pertest</title>
      <link>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/64069#M984</link>
      <description>@johnErricson yeah the CEO should delegate that to the CISO, and the CISO should build the team that runs the tooling, and send the reports to the application/infra owners who should then train the vendors, developers and admins to keep the CVEs down.&lt;BR /&gt;&lt;BR /&gt;The CISO should also run the purple-team boss and these guys should do normal validation and you can mix it up with externals because they tell you things your culture teaches you to miss.&lt;BR /&gt;&lt;BR /&gt;Feed all of these into your review, and quantify as much as you can for the CEO but unless he, she or they happened to have done the job they won’t grok it all that well.&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Nov 2023 01:46:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CISSP-Study-Group/Different-Vulnerability-scan-and-pertest/m-p/64069#M984</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2023-11-01T01:46:22Z</dc:date>
    </item>
  </channel>
</rss>

