exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 52 discussion

Actual exam question from CompTIA's PT0-001
Question #: 52
Topic #: 1
[All PT0-001 Questions]

A penetration tester is performing a remote scan to determine if the server farm is compliant with the company's software baseline. Which of the following should the penetration tester perform to verify compliance with the baseline?

  • A. Discovery scan
  • B. Stealth scan
  • C. Full scan
  • D. Credentialed scan
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
AnAverageUser3656
Highly Voted 5 years, 5 months ago
The answer should be D, you would need to have a credentialed scan in order to check the applications installed and patch levels on base lined systems.
upvoted 11 times
toroloco
4 years, 5 months ago
It will depend on the type of pentest if it was a white box, it will most definitely be D, Nevertheless this type of tricky question does not specify and as a pentester you might not get credentials making A the right anwser.
upvoted 1 times
...
...
kloug
Most Recent 2 years, 2 months ago
dddddddd
upvoted 1 times
...
miabe
2 years, 9 months ago
Selected Answer: D
looks good to me
upvoted 1 times
...
Cock
3 years, 2 months ago
It was on the exam
upvoted 2 times
...
cvMikazuki
3 years, 6 months ago
D la ngokngek. Cohort 1-2021
upvoted 1 times
...
versun
3 years, 10 months ago
Hey, SYBEX | PenTest+ Practice Test | Chapter 2 | Information Gathering and Vulnerability Identificationn | Question 147 Book says "Discovery scan" It's A maybe D is correct. But I need pass the exam. so, should I choose A?
upvoted 2 times
versun
3 years, 10 months ago
OK, I give up. I choose D
upvoted 2 times
versun
3 years, 10 months ago
OMG. I check the Offical Study Guide (Topic 4A), It 's said: Types of scans: • Discovery scan • Full scan • Stealth scan • Compliance scan SO. I choose A. For the exam!....
upvoted 2 times
DrChats
3 years, 9 months ago
Versun , how was exam, did this dump mirror questions
upvoted 1 times
...
MrYudism
3 years, 10 months ago
when do you test? i will do it on july 2
upvoted 1 times
qt23
3 years, 7 months ago
How'd it go?
upvoted 1 times
...
...
...
...
...
smalltech
3 years, 10 months ago
D.Credentialed scans are ideal for compliance-based audits of system settings such as password policies, local group membership, and local file permissions.
upvoted 1 times
...
sam9710
3 years, 10 months ago
I feel like it would be D as why would a company run black box tests for compliance of it's software? makes more sense to give it a white box environment which would make D suitable.
upvoted 1 times
...
TheThreatGuy
4 years, 3 months ago
Since there is a lack of info given, I can only assume the best answer is the one that is going to provide us the most accurate return. Thus I would choose credentialed scan.
upvoted 1 times
...
byrne
4 years, 4 months ago
D. Credentialed scan is needed in order to compare them with the company's software baseline
upvoted 1 times
...
Marlon_Franco22
4 years, 7 months ago
The answer says A but to get a patch posture of an asset would require credentials scan. I think the tricky part here is that the word penetration tester, that is why A which is discovery scan is considered here as correct as it equates this as a reconnaissance from the tester. If this was a CySA+ exam possibly D is the correct no doubt. Hmm..
upvoted 1 times
...
[Removed]
4 years, 8 months ago
A penetration tester is performing a remote scan to determine if the server farm ("server farm") A server farm or server cluster is a collection of computer servers
upvoted 1 times
...
boblee
4 years, 10 months ago
Toss up between C and D, going with D.
upvoted 3 times
...
D1960
4 years, 11 months ago
Maybe: C: Full Scan? A full scan can be credentialed. A full scan will give you the most complete and accurate information.
upvoted 1 times
mr_robot
4 years, 10 months ago
Not sure if the tester would need to go that deep just to verify compliance with the company's software baseline or you must run a full scan in order to have all possible details about the vulnerabilities from each server.
upvoted 2 times
...
...
mr_robot
5 years ago
PenTest+ Practice Tests Book A. - A discovery scan identifies the operating systems that are running on a network, maps those systems to IP addresses, and enumerates the open ports and services on those systems. Discovery scans provide penetration testers with an automated way to identify hosts that exist on the network and build an asset inventory.
upvoted 3 times
mr_robot
4 years, 11 months ago
Another tricky one. The best answer should be a non-existing Compliance Scan as per Sybex's own definition: Compliance scanning focuses on the configuration settings or the security hardening that is being applied to a system. When a compliance scan is performed against a single computing system, it produces a report that defines how well the system is hardened against the selected compliance framework. Compliance scans are not designed to locate vulnerabilities in software applications or operating systems but are designed to locate and assess vulnerabilities in system hardening configurations. In this scenario, since you are seeing more assets on the network than what was provided in the network architecture, you can attribute that to having limited network access or storage access. But since they didn't want to make it too obvious, I would go for D too as it's the only vulnerability scan type from the options. https://security.berkeley.edu/faq/nessus-network-vulnerability-scanning/how-do-i-run-credentialed-nessus-scan-windows-computer
upvoted 1 times
mr_robot
4 years, 10 months ago
...or couldn't be A? Asset discovery scan?
upvoted 1 times
toroloco
4 years, 5 months ago
It will depend on the type of pentest if it was a white box, it will most definitely be D, Nevertheless this type of tricky question does not specify and as a pentester you might not get credentials making A the right anwser.
upvoted 1 times
...
...
...
...
jon34thna
5 years, 1 month ago
SYBEX | PenTest+ Practice Test | Chapter 2 | Information Gathering and Vulnerability Identificationn | Question 147 Book says "Discovery scan" I think the book is wrong a Discovery Scan identifies hosts. I think Credentialed Scan but also could be Full scan.
upvoted 2 times
...
amankry
5 years, 4 months ago
D should be correct
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago