Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 239 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 239
Topic #: 1
[All 312-50v11 Questions]

John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.
What is the type of vulnerability assessment tool employed by John in the above scenario?

  • A. Agent-based scanner
  • B. Network-based scanner
  • C. Cluster scanner
  • D. Proxy scanner
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Ryan2019
Highly Voted 2 years, 10 months ago
Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network.
upvoted 18 times
...
Haythem026
Highly Voted 2 years, 7 months ago
By referring to CEH V11 documentation the correcte answer is : A oNetwork-Based Scanner: Network-based scanners are those that interact only with the real machine where they reside and give the report to the same machine after scanning. o Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network. o Proxy Scanner: Proxy scanners are the network-based scanners that can scan networks from any machine on the network. o Cluster scanner: Cluster scanners are similar to proxy scanners, but they can simultaneously perform two or more scans on different machines in the network.
upvoted 15 times
...
MH2
Most Recent 7 months, 1 week ago
Selected Answer: A
Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network.
upvoted 2 times
...
victorfs
11 months, 2 weeks ago
Selected Answer: A
The correct option is A. Agent-based
upvoted 1 times
...
Daniel8660
1 year, 6 months ago
Selected Answer: A
Location and Data Examination Tools Agent-based scanners reside on a single machine but can scan several machines on the same network. (P.538/522)
upvoted 2 times
...
Blueteam
1 year, 7 months ago
The Correct answer is Network based scan. You install the scanner on one machine and scan all the systems on the subnet through that scanner. Agent based scanner has an agent that is installed on each machine on the network.
upvoted 2 times
...
BIOLorenz
1 year, 8 months ago
Selected Answer: A
From CEHv11 material: Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network.
upvoted 1 times
...
StormCloak4Ever
1 year, 9 months ago
Selected Answer: B
Agent-based scanners make use of software scanners on each and every device; the results of the scans are reported back to the central server. Such scanners are well equipped to find and report out on a range of vulnerabilities. NOTE: This option is not suitable for us, since for it to work, you need to install a special agent on each computer before you start collecting data from them.
upvoted 2 times
...
Jong1
2 years, 1 month ago
Selected Answer: A
A. - CEH p.538. It's clear
upvoted 1 times
...
TheDark
2 years, 3 months ago
Another crappy CEH question - I wonder if we would need this info in our practical life
upvoted 7 times
...
Nassman
2 years, 5 months ago
You can install your agent on any machine and that scanner can scan the network or other machines. Nessus agent scanner works like this. Agent scanners can be installed on machines in networks that are behind firewalls or IDS that prohibit the scan through them. The agent would do the scan and return the results to the Nessus manager.
upvoted 1 times
...
ANDRESCB1988
2 years, 9 months ago
the correct answer is B: Network based scanner
upvoted 4 times
Uchiha_Itachi8
2 years, 9 months ago
simply Agent-based Nessus Scanner
upvoted 1 times
...
...
Kamal_SriLanka
2 years, 9 months ago
Answer is B
upvoted 2 times
Uchiha_Itachi8
2 years, 9 months ago
Wrong. Think in Nessus scanner
upvoted 1 times
...
...
Suksitt
2 years, 10 months ago
I think Agent-based scanner is to install agent on host and scan vulnerabilities of the host send back to scanner, in this case attacker scanner entire network, The answer should be Network Scanner?
upvoted 2 times
Nassman
2 years, 5 months ago
You can install your agent on any machine and that scanner can scan the network or other machines. Nessus agent scanner works like this. Agent scanners can be installed on machines in networks that are behind firewalls or IDS that prohibit the scan through them. The agent would do the scan and return the results to the Nessus manager.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...