exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 249 discussion

Actual exam question from CompTIA's CAS-004
Question #: 249
Topic #: 1
[All CAS-004 Questions]

A security architect is working with a new customer to find a vulnerability assessment solution that meets the following requirements:

• Fast scanning
• The least false positives possible
• Signature-based
• A low impact on servers when performing a scan

In addition, the customer has several screened subnets, VLANs, and branch offices. Which of the following will BEST meet the customer's needs?

  • A. Authenticated scanning
  • B. Passive scanning
  • C. Unauthenticated scanning
  • D. Agent-based scanning
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Cock
Highly Voted 2 years, 1 month ago
Selected Answer: C
C. Unauthenticated scanning would be the BEST option for the customer's needs. Unauthenticated scanning is fast, signature-based, and has a low impact on servers when performing a scan. It also has the least false positives possible when compared to authenticated scanning, which requires credentials to be entered to perform deeper scans. Additionally, unauthenticated scanning can be used across subnets, VLANs, and branch offices since it doesn't require a connection to the network devices to perform the scan .
upvoted 9 times
...
Networknovice
Highly Voted 1 year, 12 months ago
Selected Answer: D
Agent-based compared to Unauthenticated in regards to the requirements: the need for accuracy and minimizing false positives would outweigh the slightly higher impact on the server. P1s3c mentions that unauthenticated scanning may produce more false positives. If the question stated "the lowest impact on servers" then I would have gone with C. Although, in this case, it seems to prioritize the "least false positives possible". Agent-based has the least false positives
upvoted 6 times
...
Bright07
Most Recent 5 months, 1 week ago
Selected Answer: B
Passive Scanning is the best choice. Here's the breakdown of why Passive Scanning is the best choice for the given requirements: Fast scanning: Passive scanning doesn't actively probe the systems. Instead, it listens to network traffic to detect vulnerabilities. Least false positives: Passive scanning has a lower likelihood of generating false positives because it analyzes existing network traffic, which can be more accurate in detecting actual vulnerabilities compared to active scanning methods that may trigger security measures. Signature-based: Passive scanners often use signature-based detection to match patterns of known vulnerabilities and exploits within the network traffic. Low impact on servers: Since passive scanning doesn't initiate any scans or actively interact with the servers, it has minimal impact on server performance. Screened subnets, VLANs, and branch offices: Passive scanning can be ideal in complex network environments with multiple subnets and remote offices, as it doesn't require direct access to each network segment.
upvoted 1 times
...
claumagagnotti
7 months, 2 weeks ago
Selected Answer: C
Passive scanning is a technique where the system monitors network traffic and identifies vulnerabilities without actively probing or scanning the network. This method has low impact on servers, avoids false positives to a large extent (as it doesn’t rely on active probes that can sometimes misidentify issues), and is fast since it doesn’t require interacting with systems in a way that might slow them down. It also aligns well with environments that have screened subnets, VLANs, and branch offices, as passive scanners can listen to traffic from various network segments without direct interaction.
upvoted 1 times
...
23169fd
9 months, 3 weeks ago
Selected Answer: D
Fast scanning: Agent-based scanners can perform scans quickly because they are installed directly on the endpoints and can operate continuously in the background. Least false positives: Agents have direct access to the systems they are monitoring, which can help reduce false positives compared to network-based scanning methods. Signature-based: Agent-based solutions often include signature-based detection capabilities to identify known vulnerabilities. Low impact on servers: Because agents operate locally, they typically have a lower impact on network bandwidth and can be configured to use minimal system resources during scans.
upvoted 1 times
23169fd
9 months, 3 weeks ago
Unauthenticated scanning: This type of scanning can be faster and have a lower impact on servers, but it tends to produce more false positives and misses vulnerabilities that authenticated or agent-based scans would detec
upvoted 2 times
...
...
abrub
1 year, 4 months ago
Selected Answer: D
Ultimately, the choice between unauthenticated scanning, agent-based scanning, or other methods depends on the specific requirements, constraints, and priorities of the organization. If minimizing the impact on servers is a critical factor, agent-based scanning could be a suitable option.
upvoted 4 times
...
Anarckii
1 year, 4 months ago
Selected Answer: D
Given the specific requirements of fast scanning, the least false positives, signature-based, and low impact on servers, the more appropriate choice is: D. Agent-based scanning Agent-based solutions often provide accurate results with fewer false positives, as they have direct access to system information and can tailor scans based on the specifics of each system. Source:ChatGPT
upvoted 3 times
...
Ariel235788
1 year, 7 months ago
Selected Answer: A
To meet the customer's requirements for fast scanning, minimal false positives, signature-based scanning, and low impact on servers, the best choice would be authenticated scanning. Here's why authenticated scanning aligns with the specified requirements: Fast Scanning: Authenticated scanning typically tends to be faster because it has access to the target systems and can collect detailed information more efficiently. Least False Positives: Authenticated scanning can provide accurate and detailed information about the target systems, reducing false positives compared to unauthenticated scans. Signature-Based: Authenticated scanning can use signatures and authenticated checks to identify vulnerabilities, making it signature-based. Low Impact on Servers: Since authenticated scans have access to the target systems, they can gather data in a less intrusive manner, resulting in a lower impact on servers compared to some unauthenticated scans.
upvoted 3 times
...
Johnxyzzzz
1 year, 7 months ago
Selected Answer: D
Agent-based scanning. "Agent-based scanning is suitable for organizations with a geographically diverse workforce, particularly if the organization includes remote workers." Agent-based scanning runs on the device and doesn't connect back to a server. Agent-based scanning is on the device and requires credentials, so it is more accurate that unauthenticated scanning. Source: https://www.beyondsecurity.com/blog/agent-based-vs-agent-less-scanning
upvoted 3 times
...
CoinUmbrella
1 year, 7 months ago
Selected Answer: C
Unauthenticated Scanning: Unauthenticated scanning involves scanning a network or system without using specific credentials or authentication. It's typically faster because it doesn't require the scanner to log in or provide credentials, and it's signature-based, which means it uses known patterns or signatures to identify vulnerabilities. It's also less likely to generate false positives since it's scanning from an external perspective. This type of scanning is suitable for quickly assessing the security posture of servers and systems in diverse network environments, including screened subnets, VLANs, and branch offices.
upvoted 2 times
...
Sam1289
1 year, 8 months ago
Selected Answer: D
D. Agent-based scanning Agent-based scanning involves installing lightweight software agents on the target systems to be scanned. These agents collect data and perform scans locally, which reduces the impact on servers during scanning. They can also provide more accurate results since they interact directly with the local environment and applications.
upvoted 3 times
...
p1s3c
2 years ago
Selected Answer: C
Option C: Unauthenticated scanning would be the BEST solution for the customer's needs. It is a fast, signature-based scanning technique that requires no credentials to perform a scan. Since it does not require any credentials, it is a low-impact scanning method on servers, which meets the requirement. However, unauthenticated scanning may produce more false positives than authenticated scanning. It is best suited for external vulnerability scanning and would be useful in identifying vulnerabilities in screened subnets, VLANs, and branch offices.
upvoted 2 times
p1s3c
1 year, 12 months ago
changed my option to D. "least false positives" guide here. although agent-based scanning would require software to be installed on each target system, which could be impractical for large environments without a central management solution. have this issue at my current job
upvoted 5 times
...
...
Amin4799
2 years, 1 month ago
Selected Answer: C
Unauthenticated scanning is fast, has a lower impact on servers, and generates fewer false positives
upvoted 3 times
...
Serliop378
2 years, 1 month ago
Selected Answer: D
Agree with agent-based with less impacts on the server
upvoted 6 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago