exam questions

Exam 312-50 All Questions

View all questions & answers for the 312-50 exam

Exam 312-50 topic 3 question 45 discussion

Actual exam question from ECCouncil's 312-50
Question #: 45
Topic #: 3
[All 312-50 Questions]

Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?

  • A. Port scanning
  • B. Banner grabbing
  • C. Injecting arbitrary data
  • D. Analyzing service response
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
alicenara
1 year, 2 months ago
Isn't it C as well?
upvoted 1 times
NikoTomas
8 months ago
All 4 answers are correct but D) "analyzing service response" is probably the most exact, as all previous answers produce some response, which vulnerability scanner have to analyze. - Vuln. scanner connects to various (or all) ports and if there is some BANNER in the response (like HTTP header "Server: Tomcat 4.1" or initial message on SSH connection like "OpenSSL ver. 5.1"), it checks the database of vulnerabilities for that SW version in the BANNER and report it (scanner usually can't test all those vulnerabilities to confirm their presence, because it can lead to service disruption, or it is just not possible via network - for example root account is needed, etc...). Scanner injects arbitrarry data as well. After all, it analyses responses.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago