exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 97 discussion

Actual exam question from CompTIA's CS0-003
Question #: 97
Topic #: 1
[All CS0-003 Questions]

A security analyst is performing vulnerability scans on the network. The analyst installs a scanner appliance, configures the subnets to scan, and begins the scan of the network. Which of the following would be missing from a scan performed with this configuration?

  • A. Operating system version
  • B. Registry key values
  • C. Open ports
  • D. IP address
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kmordalv
Highly Voted 1 year, 8 months ago
Selected Answer: B
Correct. Registry key values are specific to Windows operating systems and are not typically scanned directly as part of vulnerability assessments. Registry key values might contain configuration settings, but vulnerability scans usually focus on the broader picture of identifying weaknesses in software, services, and configurations rather than specific values within the Windows registry.
upvoted 12 times
...
deeden
Highly Voted 1 year, 5 months ago
Selected Answer: B
It would have been clearer to be if it was phrased.. what would be missing from the scan results - instead of. Anyway, I agree with B.
upvoted 10 times
...
Learner213
Most Recent 5 months, 1 week ago
Selected Answer: D
A scanner should scan the entire registry considering that it has the proper credentials. I've never had to specify a registry key nonetheless a key value. I personally do not like the answer given but, if I have to pick one, I'm going with the IP address. I will usually specify an IP address or range of IP addresses when configuring/performing a scan.
upvoted 1 times
...
chaddman
1 year, 6 months ago
B. Registry key values A vulnerability scan performed by a scanner appliance on a network typically focuses on identifying vulnerabilities related to open ports, services, and known software vulnerabilities. It may also gather information about the operating system versions running on target hosts. However, registry key values are specific to Windows operating systems and are not typically part of a standard vulnerability scan. Registry information is typically not directly exposed or accessible via network scanning, so it's not a common target for such scans.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago