-
Active (Intrusive):
- Hands-on testing
- Might require a device to be taken offline
- Used to discover open ports and IP addresses
- Backups should be performed before the scan
- Can be detrimental to the system
-
Passive (Non-Intrusive):
- No direct effect on your network
- Might be using documentation only to test the security of a system.
- Required in real-time, mission-critical networks.
- A backup of the system is normal procedure.