Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v12 topic 1 question 14 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 14
Topic #: 1
[All 312-50v12 Questions]

An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization’s machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests.
What is the type of vulnerability assessment solution that James employed in the above scenario?

  • A. Service-based solutions
  • B. Product-based solutions
  • C. Tree-based assessment
  • D. Inference-based assessment
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jeremy13
Highly Voted 1 year ago
Selected Answer: D
Book V12 : module 5 page 558 There are four types of vulnerability assessment solutions: product-based solutions, service-based solutions, tree-based assessment, and inference-based assessment. In an inference-based assessment, scanning starts by building an inventory of the protocols found on the machine. After finding a protocol, the scanning process starts to detect which ports are attached to services, such as an email server, web server, or database server. After finding services, it selects vulnerabilities on each machine and starts to execute only those relevant tests.
upvoted 17 times
phojr
9 months ago
Do you have an offline book to read?
upvoted 1 times
...
...
kikour
Most Recent 2 weeks, 4 days ago
Selected Answer: A
detect which ports are attached to services such as an email server, a web server, or a database server It's finding for services
upvoted 1 times
...
brrbrr
2 months, 1 week ago
Selected Answer: D
• Product-based solutions: installed in the internal network • Service-based solutions: offered by third parties • Tree-based assessment: different strategies are selected for each machine • Inference-based assessment 1. Find the protocols to scan 2. Scan and find the found protocols and their services, 3. Select the vulnerabilities and begins with executing relevant tests.
upvoted 2 times
qtygbapjpesdayazko
1 month, 3 weeks ago
This is the way
upvoted 1 times
...
...
[Removed]
4 months, 2 weeks ago
Selected Answer: D
D. Inference-based assessment. This was a question for me when I took the exam on 13 Dec 2023.
upvoted 3 times
...
insaniunt
5 months ago
Selected Answer: D
D. Inference-based assessment
upvoted 1 times
...
IPconfig
6 months ago
Selected Answer: D
Inference-Based Assessment In an inference-based assessment, scanning starts by building an inventory of the protocols found on the machine. After finding a protocol, the scanning process starts to detect which ports are attached to services, such as an email server, web server, or database server. After finding services, it selects vulnerabilities on each machine and starts to execute only those relevant tests Service-Based Solutions Service-based solutions are offered by third parties, such as auditing or security consulting firms. Some solutions are hosted inside the network, while others are hosted outside the network. A drawback of this solution is that attackers can audit the network from the outside
upvoted 2 times
...
N00b1e
7 months ago
Selected Answer: D
Tree-based Assessment is the approach in which auditor follows different strategies for each component of an environment Inference-based Assessment is the approach to assist depending on the inventory of protocols in an environment Source: https://github.com/g0rbe/CEH/blob/master/05_Vulnerability_Analysis.md
upvoted 2 times
...
insaniunt
8 months, 3 weeks ago
Selected Answer: A
In this scenario, James built an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server, or a database server. He then selected the vulnerabilities on each machine and executed only the relevant tests based on the services identified. This approach is characteristic of service-based solutions, where the vulnerability assessment is focused on specific services running on the machines.
upvoted 3 times
...
Harrysphills
11 months ago
A. Service-based solutions In a service-based vulnerability assessment, the focus is on identifying vulnerabilities associated with specific services or protocols running on the organization's machines. James built an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as email server, web server, or database server. He then selected the vulnerabilities specific to each machine and executed relevant tests targeting those services. This approach allows for a more targeted and efficient assessment, focusing on the vulnerabilities associated with the identified services.
upvoted 1 times
...
Juice98
11 months, 4 weeks ago
Selected Answer: D
▪ Inference-Based Assessment In an inference-based assessment, scanning starts by building an inventory of the protocols found on the machine. After finding a protocol, the scanning process starts to detect which ports are attached to services, such as an email server, web server, or database server. After finding services, it selects vulnerabilities on each machine and starts to execute only those relevant tests.
upvoted 4 times
...
teenwolf18
12 months ago
inference-based assessment: scanning starts by building an inventory of the protocols found on the machine.
upvoted 1 times
...
Chipless
1 year ago
Selected Answer: D
In an inference-based assessment, scanning starts by building an inventory of the protocols found on the machine. After finding a protocol, the scanning process starts to detect which ports are attached to services, such as an email server, web server, or database server. After finding services, it selects vulnerabilities on each machine and starts to execute only those relevant tests. SOURCE: CEH v12 eBook Module 5 pg 375
upvoted 3 times
...
ptrckm
1 year ago
Selected Answer: D
D. Inference-based assessment "In this approach, we pre-provide the tool with services and protocols found on the machine. The tool starts the scanning process to detect the ports attached to services... Once it finds the services, it scans only the provided services for vulnerabilities." according to https://www.linkedin.com/pulse/various-approaches-involved-vulnerability-assessment-solutions-aghao?trk=pulse-article_more-articles_related-content-card
upvoted 3 times
...
eli117
1 year ago
Selected Answer: A
A. Service-based solutions Service-based solutions are a type of vulnerability assessment solution that focus on identifying the services and protocols that are running on a network or system. This involves building an inventory of the protocols found on the organization's machines in order to detect which ports are attached to services such as an email server, a web server, or a database server. Once the services have been identified, the vulnerabilities on each machine are selected, and only the relevant tests are executed. Option B (Product-based solutions) involves assessing the security of specific products or applications, such as operating systems or web applications. Option C (Tree-based assessment) and option D (Inference-based assessment) are not recognized types of vulnerability assessment solutions.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...