exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 78 discussion

Actual exam question from CompTIA's SY0-501
Question #: 78
Topic #: 1
[All SY0-501 Questions]

Which of the following network vulnerability scan indicators BEST validates a successful, active scan?

  • A. The scan job is scheduled to run during off-peak hours.
  • B. The scan output lists SQL injection attack vectors.
  • C. The scan data identifies the use of privileged-user credentials.
  • D. The scan results identify the hostname and IP address.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Basem
Highly Voted 5 years, 8 months ago
I do not think it is D since host name and IP can be found using passive methods. They are not usually hidden. It is not A, it does not matter when the job is scheduled, it does not indicate a successful scan. It is not C, why would a vulnerability scan indicate a use of privileged user. Unless I do not understand what hat means. So it must be B. Since it is identifying an attack vector.
upvoted 18 times
...
Rifo
Highly Voted 5 years, 1 month ago
B is the correct answer because it recognizes an attack vectors. As we know that transmissions are dispatched by active scanners to network's nodes, and via investigating the responses in order to indicate that whether a exclusive node holds a weak point in the network or not. A network administrator can also utilize an active scanner in order to replicate an attack in the network, exposing vulnerabilities that a probable hacker will be detected, and he can also investigate a node following an attack in order to find out that how the hacker broken security. Therefore, Option (B) is absolutely correct answer. A is wrong because that it will not make any sense that when we scheduled the scan job and it will not indicate a successful scan. C is wrong because that the scan data would not identify the use of privileged-user credentials. D is wrong because that we can find host name and IP via utilizing passive methods and generally that are not hidden.
upvoted 11 times
...
Eduardo_Madrid
Most Recent 1 year, 9 months ago
Selected Answer: C
When conducting a network vulnerability scan, using privileged-user credentials means that the scanner has obtained and used elevated privileges to access the target systems. This allows the scan to probe deeper into the system, identify vulnerabilities that might not be accessible with standard user credentials, and validate potential security issues that could be exploited by malicious attackers.
upvoted 1 times
...
Not_My_Name
4 years, 6 months ago
Does "validates a successful, active scan" mean that it returned a list of potential vulnerabilities / attack vectors, or simply that the scan executed without issue. ** I swear, a bunch of monkeys are writing these questions. **
upvoted 6 times
...
Hanzero
4 years, 7 months ago
B is correct answer. D can be found using passive methods and we don't really need an active scan. A doesn't fit in here and for C an active scan won't find any vulnerabilities associated with privileged user. A privileged user can use the account and there is nothing that states privileges are being overwritten.
upvoted 2 times
...
aymenfarah
4 years, 10 months ago
i guess "C"
upvoted 1 times
...
rhnorwoodjr
4 years, 10 months ago
In the question: "Which of the following network vulnerability scan indicators" - Identifying the hostname and ip is not a vulnerability indicator. Identifying a potential attack vector would be. I stand with the answer being B.
upvoted 4 times
MagicianRecon
4 years, 10 months ago
I am with you on this one as well
upvoted 1 times
...
...
jowen
4 years, 10 months ago
Isn't a SQLi attack a web attack (not network)?
upvoted 4 times
...
kdce
4 years, 10 months ago
B, IDs an attack vector.
upvoted 1 times
...
renegade_xt
4 years, 11 months ago
D It is after a NETWORK scan OUTPUT. The only answer providing any network related output is: The scan results identify the hostname and IP address.
upvoted 2 times
...
Meredith
4 years, 11 months ago
I agree that the answer is B. Active scans are capable of simulating attacks and repairing weak spots. Passive scans emphasize monitoring network activity.
upvoted 1 times
...
Cbenn
5 years ago
D is the correct answer per Lead2Pass
upvoted 1 times
...
Dante_Dan
5 years, 1 month ago
In active scanning, the scanner sends packets to a remote target to provide a snapshot of network services and applications. These are compared to a plugin database to determine if any vulnerabilities are present. So active scanning is for more specifics services and vulnerabolities found in a network.
upvoted 1 times
...
MelvinJohn
5 years, 2 months ago
The question doesn't say if it's a credentialed or non-credentialed active scan. Main two categories: Agent scans and traditional active network scans. 1. Traditional active scans originate from a scanner that reaches out to targeted hosts for scanning. There are two types of active scans: non-credentialed and credentialed. a. Active non-credentialed scan (an unauthenticated scan) assesses the security of systems without system privileges. They enumerate ports, protocols, and services exposed on hosts and identify vulnerabilities and misconfigurations. b. Active credentialed scan (an authenticated scan) uses credentials to log into systems and applications and can provide a definitive list of required patches and misconfigurations. 2. Agent scans run on all hosts regardless of network location or connectivity and report the results back to the manager. They collect vulnerability, compliance, and system data, and report that information back to Nessus Manager or Tenable.io for analysis. Agents are designed to have minimal impact on the system and the network, giving you the benefit of direct access to all hosts without disrupting end users.
upvoted 3 times
...
gm4pack
5 years, 4 months ago
The answer is D. Prof. Messer section 1.5 vulnerability scanning video, the answer is B, but you need to pay attention to when he runs the scan. What are the first things that come up? +Target IP: 10.1.10.222 +Taget Hostname: 10.1.10.222 Both of those would indicate a successful scan because it was able to identify the target. Not all scans will result in an output that lists SQL injection attack vectors. The scan with the known vulnerability has the same target IP and hostname at the beginning.
upvoted 9 times
...
Aspire
5 years, 6 months ago
Answer is D
upvoted 2 times
...
Stefanvangent
5 years, 7 months ago
Active scanners send transmissions to the network's nodes, examining the responses they receive to evaluate whether a specific node represents a weak point within the network. A network administrator can also use an active scanner to simulate an attack on the network, uncovering weaknesses a potential hacker would spot, or examine a node following an attack to determine how a hacker breached security. Sounds like B is the correct answer.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago