During a vulnerability assessment, you are tasked with scanning a target network with known bandwidth limitations. Which of the following is the BEST approach to performing the scan while minimizing the impact on the network's performance?
Use an aggressive scanning method to finish the scan more quickly.
Throttle the scan speed to use minimal bandwidth and prevent network congestion.
Scan without credentials to reduce the amount of data transferred.
Run the scan during peak business hours to blend in with regular traffic.
Reducing the speed at which the scan is carried out (Throttling the scan speed) is the best approach when dealing with bandwidth limitations. It ensures that the vulnerability scan does not consume excessive bandwidth, which could slow down the network for legitimate users or cause disruptions. It also helps avoid triggering alarms that could alert network administrators to the scan's presence. Although performing the scan during off-peak hours or using less intrusive scan types may help, they do not directly address the problem of limited bandwidth as effectively as actively managing the scan's bandwidth usage.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean to throttle scan speed?
Open an interactive chat with Bash
Why is running a scan during peak hours not a good idea?