George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of
their wireless network. He plans on remaining as “stealthy” as possible during the scan. Why would a scanner
like Nessus is not recommended in this situation?

A.
Nessus is too loud
B.
Nessus cannot perform wireless testing
C.
Nessus is not a network scanner
D.
There are no ways of performing a “stealthy” wireless scan
Nessus allows scans for the following types of vulnerabilities:
Vulnerabilities that allow a remote hacker to control or access sensitive data on a system.
Misconfiguration (e.g. open mail relay, missing patches, etc.).
Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.
Denials of service against the TCP/IP stack by using malformed packets
Preparation for PCI DSS audits