exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 42 discussion

Actual exam question from CompTIA's CS0-003
Question #: 42
Topic #: 1
[All CS0-003 Questions]

A company is in the process of implementing a vulnerability management program, and there are concerns about granting the security team access to sensitive data. Which of the following scanning methods can be implemented to reduce the access to systems while providing the most accurate vulnerability scan results?

  • A. Credentialed network scanning
  • B. Passive scanning
  • C. Agent-based scanning
  • D. Dynamic scanning
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Kmelaun
Highly Voted 8 months ago
According to Jason Dion, agent based scans are always credentialed…
upvoted 10 times
...
sawixe
Most Recent 2 weeks, 2 days ago
Selected Answer: B
You dont need to touch the system at all
upvoted 1 times
...
fuzzyguzzy
1 month, 1 week ago
Selected Answer: B
B: Passive scanning has the least amount of access to the system. It doesn't require credentials or installation. The most popular answer is C (agent-based scanning), but that requires an instance being installed on a host (this is access), therefore, it's not the correct answer.
upvoted 1 times
...
ZeroLA88
1 month, 3 weeks ago
Selected Answer: C
Answer: C Explanation: Agent-based scanning is a method that involves installing software agents on the target systems or networks that can perform local scans and report the results to a central server or console. Agent- based scanning can reduce the access to systems, as the agents do not require any credentials or permissions to scan the local system or network. Agent-based scanning can also provide the most accurate vulnerability scan results, as the agents can scan continuously or on-demand, regardless of the system or network status or location.
upvoted 3 times
...
bieecop
1 month, 4 weeks ago
Selected Answer: A
Accuracy of results: Credentialed scans give security teams the necessary level of access to a system, just like any normal user, which allows for a more detailed and accurate examination of vulnerabilities than unauthenticated scans that only provide external visibility into a system.
upvoted 1 times
...
dude2f4
4 months, 1 week ago
this is a dumb question... the answers are awful. i have to go with B. passive scanning... agent based has nothing to with this... credentialed scanning just means youre using credentials within your scan. usually from a service account. this helps get more detailed information from the asset. security analyst have to be trusted with sensitive data/information or else they can not perform their duties.
upvoted 3 times
...
hackerhavoc
4 months, 1 week ago
Selected Answer: C
“ there are concerns about granting the security team access to sensitive data” specifically says no to A. Credentialed. Answers C. Agent-based scanning
upvoted 2 times
...
RootAfrica
4 months, 3 weeks ago
Agent BASED SCANNING ITS THE RIGHT ANSWER
upvoted 1 times
...
Kmelaun
8 months ago
Selected Answer: A
The answer here is A, credentialed based scans provide the most accurate detail during a scan.
upvoted 1 times
Phanna
7 months, 2 weeks ago
As I am working in the Vulnerability Assessment and based on this scenario, I would need to choose Agent-based scanning. Here's why: +There is no need to use credentials (username and password), while the agent is installed through the supper admin account on the target machine +Less network bandwidth consumption +Local based on the target => The answer is C
upvoted 11 times
...
...
cartman_sc
8 months, 1 week ago
Selected Answer: C
Só a C impede o compartilhamento de senhas e acessos aos ambientes.
upvoted 1 times
...
dave_delete_me
8 months, 2 weeks ago
ANSWER C: Because the exam objectives teaches us to have a single pane of glass solution and THAT verbiage holds true here >>> "involves installing software agents on the target systems or networks that can perform local scans and report the results to a central server or console.
upvoted 1 times
...
libertest
8 months, 3 weeks ago
Selected Answer: C
It's C. Agent based scanning will prevent sharing credentials and accurate results
upvoted 1 times
...
CyberJackal
9 months, 2 weeks ago
Selected Answer: C
This is clearly Agent-based scanning.
upvoted 1 times
...
tcgod666
9 months, 2 weeks ago
Selected Answer: C
the answer is C since don't want to share access to sensitive data.
upvoted 1 times
...
Demarco
11 months, 2 weeks ago
ANSWER C: Agent-based scanning is a method that involves installing software agents on the target systems or networks that can perform local scans and report the results to a central server or console. Agent- based scanning can reduce the access to systems, as the agents do not require any credentials or permissions to scan the local system or network. Agent-based scanning can also provide the most accurate vulnerability scan results, as the agents can scan continuously
upvoted 3 times
...
WaaHassan
1 year ago
Selected Answer: C
The right answer should be corrected
upvoted 1 times
...
LiveLaughToasterBath
1 year, 1 month ago
Selected Answer: A
Credentialed scan makes no sense
upvoted 3 times
LiveLaughToasterBath
1 year, 1 month ago
I didn't mean to select A. Supposed to have been C-Agent Based.
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago