exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 14 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 14
Topic #: 1
[All 312-50v13 Questions]

An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization’s machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests.
What is the type of vulnerability assessment solution that James employed in the above scenario?

  • A. Service-based solutions
  • B. Product-based solutions
  • C. Tree-based assessment
  • D. Inference-based assessment
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
john7588
1 week, 6 days ago
Selected Answer: A
This approach focuses on identifying and assessing the services running on different ports. James builds an inventory of protocols to determine which services (like email servers, web servers, and database servers) are available and then executes tests relevant to those specific services. This aligns directly with his methodology.
upvoted 1 times
...
mulekule
4 weeks, 1 day ago
Selected Answer: D
Inference-based vulnerability assessment starts by identifying protocols on a machine, then detects associated ports and services, and finally selects and executes relevant vulnerability tests based on the identified services.
upvoted 1 times
...
ehsarx
1 month, 3 weeks ago
Selected Answer: D
Inference-Based Assessment: This approach begins by cataloging the protocols present on a machine. Once a protocol is identified, the scanning process detects the associated ports and services, such as an email, web server, or database server. Upon identifying services, it targets specific vulnerabilities on each machine and executes tests that are only relevant to the discovered services.
upvoted 1 times
...
Gentle_Hckr
2 months ago
Selected Answer: A
The key point in the scenario is that James identified the services (like email, web, or database servers) and then selected the relevant vulnerabilities for each service. This approach is characteristic of service-based solutions, where vulnerabilities are chosen based on the specific services identified on the machine. In Inference-Based Assessment, there would typically be more of a focus on deducing or inferring vulnerabilities from the services, rather than directly selecting known vulnerabilities tied to those services. So, based on the scenario, A. Service-based solutions is the correct choice.
upvoted 2 times
...
SNimlaka
3 months, 1 week ago
Selected Answer: D
Inference-Based Assessment: In an inference-based assessment, scanning starts by building an inventory of the protocols found on the machine. After finding a protocol, the scanning process starts to detect which ports are attached to services, such as an email server, web server, or database server. After finding services, it selects vulnerabilities on each machine and starts to execute only those relevant tests. Page 582
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago