Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v12 topic 1 question 31 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 31
Topic #: 1
[All 312-50v12 Questions]

John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.
What is the type of vulnerability assessment tool employed by John in the above scenario?

  • A. Agent-based scanner
  • B. Network-based scanner
  • C. Cluster scanner
  • D. Proxy scanner
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jeremy13
Highly Voted 1 year ago
Selected Answer: A
A. Agent-based scanner Module 05/P561 CEH bookV12 *Network-Based Scanner: Network-based scanners are those that interact only with the real machine where they reside and give the report to the same machine after scanning. *Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network. *Proxy Scanner: Proxy scanners are the network-based scanners that can scan networks from any machine on the network. * Cluster scanner: Cluster scanners are similar to proxy scanners, but they can simultaneously perform two or more scans on different machines in the network.
upvoted 13 times
...
eli117
Highly Voted 1 year ago
Selected Answer: B
B. Network-based scanner Explanation: In the given scenario, John employs a network-based scanner to identify vulnerabilities on the machines in the same network. A network-based scanner is a type of vulnerability assessment tool that scans the network for vulnerabilities and identifies security holes in the network devices and systems. It is a non-intrusive scanner that can detect vulnerabilities without accessing the system. It sends packets to the network and analyzes the response to identify vulnerabilities.
upvoted 5 times
best2000
12 months ago
you would have been right is the was no installing. the question said the scanner was installed on a machine. the right answer is A
upvoted 5 times
...
...
desertlotus1211
Most Recent 2 weeks, 5 days ago
Though the scanner software was installed on a victims machine... Actually a network based scanner is being performed to identify vulnerabilities on the network and on the other machines. Agent based scanner would be installed a on machine BUT will send information about THAT machine to a central repo. This is not happening in this scenario.
upvoted 1 times
desertlotus1211
2 weeks, 5 days ago
Agent-based scanning is a type of vulnerability scanning that involves installing a software agent on each system that needs to be scanned. The agent then monitors and reports on the system's status, enabling real-time data collection and analysis.
upvoted 1 times
...
...
jettguo
1 month, 1 week ago
Selected Answer: B
My answer is network-base scanner. Reason 1: although an "agent" is installed on a victim machine, there is no mention of using this scanner to scan for vulnerability on this victim machine. Reason 2: The "agent" was used to scan on machines within the network, this fits the signature of a "network-based scanner"
upvoted 1 times
...
sh4dali
1 month, 3 weeks ago
Selected Answer: A
A. Agent based. "installed a scanner on a machine" keyword is on a machine.
upvoted 1 times
...
barey
2 months, 2 weeks ago
GPT4: B. Network-based scanner In the scenario described, the professional hacker is using a network-based scanner. This type of scanner is deployed on a network and scans multiple machines on that network to identify potential vulnerabilities without being installed on each individual machine. Network-based scanners are commonly used to assess security posture and identify vulnerabilities that could be exploited.
upvoted 1 times
...
yasso2023
3 months, 2 weeks ago
Selected Answer: A
In the scenario described, where the hacker installed a scanner on a machine within the victim's network and scanned several machines on the same network, it aligns more closely with an Agent-Based Scanner. Agent-based scanners reside on a single machine but can scan several machines on the same network.
upvoted 1 times
...
yasso2023
3 months, 2 weeks ago
In the scenario described, where the hacker installed a scanner on a machine within the victim's network and scanned several machines on the same network, it aligns more closely with an Agent-Based Scanner. Agent-based scanners reside on a single machine but can scan several machines on the same network.
upvoted 1 times
...
HetBeest
4 months, 2 weeks ago
None-of-the-above would have been my answer. John didn't employ anything (himself).
upvoted 1 times
...
4MM449
4 months, 2 weeks ago
Selected Answer: A
A. Agent-based scanner
upvoted 1 times
...
insaniunt
5 months ago
Selected Answer: A
page 561 from CEH v12 book: Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network. A. Agent-Based Scanner
upvoted 1 times
...
AA_Ron
5 months, 1 week ago
Selected Answer: B
ChatGPT, Bard, Perplexity all using the Tree of Thought answering said B. A.I. = from Gods mouth to my ears. (Robot ears)
upvoted 1 times
...
davitm
6 months ago
B. Network-based scanner Agent-based scanners can reside on a single machine and scan several machines on the same network. Agent-based scanners typically involve installing a scanning agent or software component on each target machine that you want to scan. These agents communicate with a central management system or console, which controls and coordinates the scanning process. The central console can initiate scans on multiple machines across the network, making it possible to scan multiple systems from a single machine where the console is installed. This approach provides more control and flexibility, as you can customize scanning options for each target machine and collect detailed information. However, it requires installing agents on each target system, which can be resource-intensive and may not be suitable for all scenarios.
upvoted 1 times
...
sringan
6 months, 3 weeks ago
Selected Answer: B
The main difference between agent-based scanners and network-based scanners is that agent-based scanners require a software agent to be installed on each machine that is being scanned, while network-based scanners do not. Here the tool is installed only on one device. So it is network-based.
upvoted 2 times
...
solaWONDER
7 months ago
Answer: B. Network-based scanner Network-based scanners are used to scan networks for vulnerabilities. They work by sending probes to all of the devices on a network to identify open ports and services, as well as any known vulnerabilities associated with those ports and services. In the scenario described, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network. This is consistent with the use of a network-based scanner. Agent-based scanners work by installing a software agent on each device that needs to be scanned. The agent then communicates with a central server to report on the vulnerabilities that it finds.
upvoted 2 times
...
sausageman
1 year ago
Selected Answer: A
Agent based scanner
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...