Does your company utilize a vulnerability scanning tool to identify vulnerabilities on external and/or internal hosts?

external vulnerability scanning

Vulnerability scanning uses software to attempt to connect to hosts in the specified range of ports.  When the scanner detects that the port is open, it will try to identify if the software opening the port on the server is vulnerable to a list of known vulnerabilities. If the system proves to be vulnerable, it is added to the report.

The information from a vulnerability scan can be used to either attack the system using known weaknesses or to create a list of vulnerabilities to be addressed.

Why are they asking this?

They want your organization to be scanning your external systems so that vulnerabilities are discovered and addressed by you before they can be exploited.

What do they expect?

It is expected that external vulnerability scanning is included in your security plans.  You may include it in the vulnerability management plan or other policies.

internal vulnerability scanning

Internal vulnerability scanning is the use of a vulnerability scanner to scan the internal networks for vulnerabilities. The vulnerability scanner uses a set of rules to look for vulnerabilities caused by software weaknesses or misconfigured services.

Why are they asking this?

The regular use of vulnerability scanners can help to detect vulnerabilities before they are  exploited by malicious users or external parties. Vulnerability scanning is part of a comprehensive security policy.

What do they expect?

They expect regular, automated scans by an updated vulnerability scanner. This should be part of the security policies and procedures. The procedures should include updating the scanner and ruleset on a frequent basis to ensure that the latest vulnerabilities are detected.