exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 197 discussion

Actual exam question from CompTIA's CS0-003
Question #: 197
Topic #: 1
[All CS0-003 Questions]

A Chief Information Security Officer has outlined several requirements for a new vulnerability scanning project:

• Must use minimal network bandwidth
• Must use minimal host resources
• Must provide accurate, near real-time updates
• Must not have any stored credentials in configuration on the scanner

Which of the following vulnerability scanning methods should be used to best meet these requirements?

  • A. Internal
  • B. Agent
  • C. Active
  • D. Uncredentialed
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cy_analyst
Highly Voted 7 months ago
Selected Answer: B
Minimal network bandwidth: Agent-based scanning distributes the scanning load to the endpoints (hosts) themselves. Since agents run locally on the host, they minimize the amount of network traffic typically generated by centralized scanners. Minimal host resources: Modern agent-based solutions are designed to have a small footprint on the host, using minimal CPU and memory resources. The agent collects and reports only relevant data, reducing the impact on the host's performance. Accurate, near real-time updates: Agents can continuously monitor the system and provide near real-time updates on vulnerabilities since they run directly on the hosts. This gives more accurate and timely results compared to periodic scans. No stored credentials in configuration on the scanner: Since agents are installed directly on the hosts, there's no need to store credentials in the scanner configuration. This reduces the risk of compromising credentials and avoids the need to configure authentication for network-based scans.
upvoted 6 times
...
voiddraco
Most Recent 8 months, 3 weeks ago
B Agent-based vulnerability scanning is a method that uses software agents installed on the target systems to scan for vulnerabilities. This method meets the requirements of the project because it uses minimal network bandwidth and host resources, provides accurate and near real-time updates, and does not require any stored credentials on the scanner. Reference: What Is Vulnerability Scanning? Types, Tools and Best Practices, Section: Types of vulnerability scanning; CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition, Chapter 4: Security Operations and Monitoring, page 154. Not GPT!
upvoted 2 times
...
gomet2000
8 months, 3 weeks ago
Selected Answer: D
No Stored Credentials: Uncredentialed scans inherently avoid the need for credentials, completely eliminating any associated risk. Agent-based systems might still require credentials to perform certain tasks, even if the risk is minimal. Minimal Host Impact: Uncredentialed scans are less intrusive and consume virtually no resources on the hosts, making them ideal for environments where minimal impact on host performance is critical. Agent-based scanning, while efficient, does introduce some level of resource consumption on the host. Ease of Implementation: Uncredentialed scanning is typically easier to implement and manage since it doesn't involve deploying and maintaining agents across multiple hosts.
upvoted 2 times
kinny4000
7 months, 1 week ago
There no credentials stored in configuration on the scanner, the agent is simply running with privileges on the host, so the scanner is not storing any credentials. Uncredentialed scans won't be accurate, and won't be near real time unless it's always running, which would cause network latency.
upvoted 3 times
...
...
section8santa
1 year ago
Selected Answer: B
B. Agent Agent-based vulnerability scanning involves deploying lightweight software agents on individual hosts within the network. These agents conduct local vulnerability assessments on the host they are installed on, thereby minimizing network bandwidth usage and reducing the load on individual hosts compared to traditional network-based scanning methods.
upvoted 4 times
...
HL2020
1 year ago
This is a rough question. Since a requirement says "minimal host resources" you'd want to not choose B but it also says "near real-time updates" which would lean towards B. I'd probably go with B on this one but not a great question.
upvoted 3 times
...
thisguyfucks
1 year ago
Selected Answer: D
Answer is D Uncredentialed
upvoted 1 times
...
julessandrin
1 year, 2 months ago
Selected Answer: B
Agent-based scanning provides the most effective and efficient vulnerability scan with minimal impact on a host. It requires no credentials management and offers low resource consumption.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago