Bug Bounty Program Certification 5.2: Find Major Bugs in Server

Bug Bounty Program Certification 5.2: Find Major Bugs in Server

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

This video tutorial covers the use of Nessus Network Vulnerability Scanner. It begins with an introduction to Nessus, including its installation and setup on a Windows operating system. The tutorial then demonstrates how to start Nessus, log in, and configure it to scan multiple IP addresses or a range of IP addresses. It explains how to configure and launch scans, analyze the results, and identify vulnerabilities. The video concludes with instructions on completing the scan and downloading reports.

Read more

3 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What information do you need to provide when creating a new scan in Nessus?

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

Explain how Nessus identifies vulnerabilities in scanned machines.

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What steps should be taken after a scan is completed in Nessus?

Evaluate responses using AI:

OFF