exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 42 discussion

Actual exam question from CompTIA's CS0-003
Question #: 42
Topic #: 1
[All CS0-003 Questions]

A company is in the process of implementing a vulnerability management program, and there are concerns about granting the security team access to sensitive data. Which of the following scanning methods can be implemented to reduce the access to systems while providing the most accurate vulnerability scan results?

  • A. Credentialed network scanning
  • B. Passive scanning
  • C. Agent-based scanning
  • D. Dynamic scanning
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Kmelaun
Highly Voted 10 months ago
According to Jason Dion, agent based scans are always credentialed…
upvoted 10 times
...
botla
Most Recent 3 days, 18 hours ago
Selected Answer: C
My intuitive answer was as well A, but there is an important difference: a local Agent does not require a centralised privileged account to be stored within the security team. Now an Agent in itself is also a very direct access, but depending on the capabilities this could be of limited and managed impact. In the end (in real life) it is a balance between access and quality of scan results that needs to be taken into account. A risk analysis would determine the best approach...
upvoted 1 times
...
CyberMom
1 month ago
Selected Answer: A
Credentialed network scanning. Here's the reasoning: Increased Accuracy: Credentialed scanning allows the vulnerability scanner to log in to the target systems using provided credentials. This approach typically results in more comprehensive and accurate vulnerability detection, as it provides insights into configuration issues and vulnerabilities that may not be visible via non-credentialed
upvoted 1 times
...
sawixe
2 months, 2 weeks ago
Selected Answer: B
You dont need to touch the system at all
upvoted 1 times
...
fuzzyguzzy
3 months, 2 weeks ago
Selected Answer: B
B: Passive scanning has the least amount of access to the system. It doesn't require credentials or installation. The most popular answer is C (agent-based scanning), but that requires an instance being installed on a host (this is access), therefore, it's not the correct answer.
upvoted 2 times
...
ZeroLA88
3 months, 3 weeks ago
Selected Answer: C
Answer: C Explanation: Agent-based scanning is a method that involves installing software agents on the target systems or networks that can perform local scans and report the results to a central server or console. Agent- based scanning can reduce the access to systems, as the agents do not require any credentials or permissions to scan the local system or network. Agent-based scanning can also provide the most accurate vulnerability scan results, as the agents can scan continuously or on-demand, regardless of the system or network status or location.
upvoted 3 times
...
bieecop
4 months ago
Selected Answer: A
Accuracy of results: Credentialed scans give security teams the necessary level of access to a system, just like any normal user, which allows for a more detailed and accurate examination of vulnerabilities than unauthenticated scans that only provide external visibility into a system.
upvoted 1 times
...
dude2f4
6 months, 1 week ago
this is a dumb question... the answers are awful. i have to go with B. passive scanning... agent based has nothing to with this... credentialed scanning just means youre using credentials within your scan. usually from a service account. this helps get more detailed information from the asset. security analyst have to be trusted with sensitive data/information or else they can not perform their duties.
upvoted 3 times
...
hackerhavoc
6 months, 2 weeks ago
Selected Answer: C
“ there are concerns about granting the security team access to sensitive data” specifically says no to A. Credentialed. Answers C. Agent-based scanning
upvoted 2 times
...
[Removed]
6 months, 3 weeks ago
Agent BASED SCANNING ITS THE RIGHT ANSWER
upvoted 1 times
...
Kmelaun
10 months ago
Selected Answer: A
The answer here is A, credentialed based scans provide the most accurate detail during a scan.
upvoted 1 times
Phanna
9 months, 3 weeks ago
As I am working in the Vulnerability Assessment and based on this scenario, I would need to choose Agent-based scanning. Here's why: +There is no need to use credentials (username and password), while the agent is installed through the supper admin account on the target machine +Less network bandwidth consumption +Local based on the target => The answer is C
upvoted 12 times
...
...
cartman_sc
10 months, 1 week ago
Selected Answer: C
Só a C impede o compartilhamento de senhas e acessos aos ambientes.
upvoted 1 times
...
dave_delete_me
10 months, 2 weeks ago
ANSWER C: Because the exam objectives teaches us to have a single pane of glass solution and THAT verbiage holds true here >>> "involves installing software agents on the target systems or networks that can perform local scans and report the results to a central server or console.
upvoted 1 times
...
libertest
10 months, 4 weeks ago
Selected Answer: C
It's C. Agent based scanning will prevent sharing credentials and accurate results
upvoted 1 times
...
CyberJackal
11 months, 2 weeks ago
Selected Answer: C
This is clearly Agent-based scanning.
upvoted 1 times
...
tcgod666
11 months, 3 weeks ago
Selected Answer: C
the answer is C since don't want to share access to sensitive data.
upvoted 1 times
...
Demarco
1 year, 1 month ago
ANSWER C: Agent-based scanning is a method that involves installing software agents on the target systems or networks that can perform local scans and report the results to a central server or console. Agent- based scanning can reduce the access to systems, as the agents do not require any credentials or permissions to scan the local system or network. Agent-based scanning can also provide the most accurate vulnerability scan results, as the agents can scan continuously
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago