exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 12 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 12
Topic #: 1
[All 312-50v12 Questions]

A newly joined employee, Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors.
What is the type of vulnerability assessment performed by Martin?

  • A. Database assessment
  • B. Host-based assessment
  • C. Credentialed assessment
  • D. Distributed assessment
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
BallCS
2 months, 4 weeks ago
Selected Answer: B
He also identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors.
upvoted 2 times
...
RobertVidal
3 months ago
Selected Answer: B
Conducts a configuration-level check to identify system configurations, user directories, file systems, registry settings,etc., to evaluate the possibility of compromise. (pag. 553, module 5 Vulnerability Analysis)
upvoted 2 times
...
Mann098
3 months, 3 weeks ago
Selected Answer: B
host-based assessment, as the vulnerabilities analyzed (directories, registries, configuration errors) pertain to a specific host system
upvoted 1 times
...
kimsteve
4 months, 3 weeks ago
Selected Answer: B
Host-based assessments are a type of security check that involve conducting a configuration-level check to identify system configurations, user directories, file systems, registry settings, and other parameters to evaluate the possibility of compromise. These assessments check the security of a particular network or server. Host-based scanners assess systems to identify vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors. Host-based assessments use many commercial and open-source scanning tools.
upvoted 2 times
...
insaniunt
4 months, 3 weeks ago
Selected Answer: B
B. Host-based assessment
upvoted 1 times
...
vargasamson
6 months ago
Selected Answer: B
B. Host-based assessment Martin definitely investigate one concrate machine, which is a host-based assessment.
upvoted 1 times
...
jks945797
8 months, 1 week ago
Selected Answer: B
B. Host-based assessment
upvoted 1 times
...
amomyty
9 months, 1 week ago
C. Credentialed assessment
upvoted 1 times
...
naija4life
9 months, 3 weeks ago
Selected Answer: C
C. Credentialed assessment Credentialed scans require administrative access to the systems being scanned and are performed using the same credentials and privileges as an administrative user. The scans perform a thorough examination of the system, looking for vulnerabilities that could be exploited by a malicious attacker.
upvoted 1 times
...
Harrysphills
10 months, 3 weeks ago
The type of vulnerability assessment performed by Martin is: B. Host-based assessment In a host-based assessment, the focus is on evaluating the security of an individual system or host. Martin assessed the allocated system by examining user directories, registries, system parameters, native configuration tables, registry or file permissions, and software configuration errors. This type of assessment helps identify vulnerabilities specific to the host, including misconfigurations, insecure settings, and potential avenues for compromise. It aims to ensure the security and integrity of the individual system being assessed.
upvoted 2 times
...
jeremy13
11 months, 3 weeks ago
Selected Answer: B
B. Host-based assessment Like V11 Q245
upvoted 1 times
...
eli117
1 year ago
Selected Answer: B
B. Host-based assessment A host-based assessment is a type of vulnerability assessment that focuses on individual computer systems or hosts. It involves examining the configuration, settings, and software installed on the host to identify vulnerabilities that could be exploited by attackers.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago