The five types of vulnerability assessments are;

  • Network-based scans

  • Host-based scans

  • Wireless scans

  • Application scans

  • Database scans