Organizations are frequently attacked by external entities. Thus, organizations with mature information security departments typically conduct port scans, as well as enumeration and password-cracking exercises on their own systems. These services, both official and unofficial, create the potential for exposure and exploitation. Consider the following questions and respond to at least three from the list:
undefined
Why is port scanning useful?
Why would attackers scan systems and networks?
Why would security analysts scan systems and networks?
Why is enumeration useful?
Why would security analysts use password cracking tools?
Sample Solution