exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 394 discussion

Actual exam question from CompTIA's SY0-601
Question #: 394
Topic #: 1
[All SY0-601 Questions]

Which of the following would MOST likely be identified by a credentialed scan but would be missed by an uncredentialed scan?

  • A. Vulnerabilities with a CVSS score greater than 6.9.
  • B. Critical infrastructure vulnerabilities on non-IP protocols.
  • C. CVEs related to non-Microsoft systems such as printers and switches.
  • D. Missing patches for third-party software on Windows workstations and servers.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
seagnull
Highly Voted 2 years, 2 months ago
Selected Answer: D
A-C, all can be accessed publicly. D - you need to log in to check these apps
upvoted 13 times
...
ApplebeesWaiter1122
Highly Voted 1 year, 10 months ago
Selected Answer: D
An uncredentialed scan is performed without privileged access to the target system, meaning it does not have credentials (such as usernames and passwords) to log in to the target systems. Therefore, it can only detect vulnerabilities and missing patches based on information available externally, such as network services and banners.
upvoted 7 times
...
Gigi42
Most Recent 10 months, 2 weeks ago
Selected Answer: D
This question is somewhat similar to question #387.The answer for #387 was 3rd party applications are not being patched and therefore that's the reason for the vulnerability scanner going off, flagging lots of hosts.
upvoted 1 times
...
memodrums
1 year, 2 months ago
Selected Answer: B
Non-IP protocols would not been seen with an uncredentialed scan because they reside internally meaning you need internal access (internal account with UN and PW) to see these IP protocols.
upvoted 1 times
...
Malkhofash
1 year, 3 months ago
Credentialed scans involve using valid credentials (such as usernames and passwords) to access the target system. This allows the scanning tool to perform a more in-depth assessment, including checking for missing patches on the system, which may include third-party software. D Uncredentialed scans, on the other hand, do not have access to the internal workings of the system and may miss certain vulnerabilities or issues that require authenticated access.
upvoted 2 times
...
goodmate
1 year, 6 months ago
Answer B https://docs.tenable.com/nessus-agent/Content/TraditionalScansUncredentialed.htm Traditional Active Scans (Non-credentialed) Limitations: Can be disruptive; that is, can sometimes have a negative effect on the network, device, or application you are testing. Misses client-side vulnerabilities such as detailed patch information. ----> Can miss transient devices that are not always connected to the network.
upvoted 1 times
...
AzureG0d
1 year, 6 months ago
Selected Answer: D
I was on the fence initially but here's two examples why it's D. See below. https://xoslab.com/what-is-the-primary-difference-between-credentialed-and-non-credentialed-scans-2/ Question 13 States: Q13: Can non-credentialed scans identify missing patches? A13: Yes, non-credentialed scans can identify missing patches by comparing the software versions against known vulnerabilities. https://subscription.packtpub.com/book/cloud-and-networking/9781789348019/8/ch08lvl1sec90/credentialed-v-non-credentialed-scans If i had to guess i'd say that B is for credentialed scans, or there could be two right answers here.
upvoted 1 times
...
AmesCB
1 year, 8 months ago
Selected Answer: B
uncredentialed scans should still be able to view software versions for 3rd party software no? I am not sure that D is the answer
upvoted 1 times
...
madboy2
2 years ago
Selected Answer: D
It will be able to find unpatched software with no listening ports like Java, PDF Reader, etc.
upvoted 2 times
...
Nishkurup
2 years, 1 month ago
Based on below I think its D. https://docs.tenable.com/nessusagent/Content/TraditionalScansUncredentialed.htm
upvoted 3 times
...
ganymede
2 years, 1 month ago
Selected Answer: B
B. Critical infrastructure vulnerabilities on non-IP protocols. Assuming that "non IP protocols" means a system or application that isn't exposed on the network. An uncredentialed scan will not be able to see or scan any system or application that isn't exposed on the network while a credentialed scan can. D is completely wrong. It's very Common to have internet exposed third party applications installed and running on windows machines. So vulnerability scanners will be able to scan them and find unpatched vulnerabilities. One real world example: The Apache Web server running on a windows server. An uncredentialed vulnerability scan would be able to scan apache and find unpatched vulnerabilities. D is wrong.
upvoted 2 times
memodrums
1 year, 2 months ago
that's the way I saw it too. Non-IP protocols would not been seen with an uncredentialed scan because they reside internally meaning you need internal access (internal account with UN and PW) to see these IP protocols.
upvoted 1 times
...
...
Jibz18
2 years, 2 months ago
Selected Answer: D
D - Missing patches for third-party software on Windows workstations and servers.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago