I have a few questions on Vulnerability assessment.

How can network assets in an Enterprise network be discovered if the
ICMP is turned off on the network?

Does NMap depend on the ICMP protocol for mapping the network assets?

How do the commercial vulnerability scanners discover the assets?

Thank you in advance.

Subba Rao
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to