Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 14 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 14
Topic #: 1
[All 312-50v12 Questions]

An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization’s machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests.
What is the type of vulnerability assessment solution that James employed in the above scenario?

  • A. Service-based solutions
  • B. Product-based solutions
  • C. Tree-based assessment
  • D. Inference-based assessment
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jeremy13
Highly Voted 1 year, 7 months ago
Selected Answer: D
Book V12 : module 5 page 558 There are four types of vulnerability assessment solutions: product-based solutions, service-based solutions, tree-based assessment, and inference-based assessment. In an inference-based assessment, scanning starts by building an inventory of the protocols found on the machine. After finding a protocol, the scanning process starts to detect which ports are attached to services, such as an email server, web server, or database server. After finding services, it selects vulnerabilities on each machine and starts to execute only those relevant tests.
upvoted 19 times
phojr
1 year, 3 months ago
Do you have an offline book to read?
upvoted 1 times
...
...
brrbrr
Highly Voted 1 month, 4 weeks ago
Selected Answer: D
• Product-based solutions: installed in the internal network • Service-based solutions: offered by third parties • Tree-based assessment: different strategies are selected for each machine • Inference-based assessment 1. Find the protocols to scan 2. Scan and find the found protocols and their services, 3. Select the vulnerabilities and begins with executing relevant tests.
upvoted 5 times
qtygbapjpesdayazko
8 months, 2 weeks ago
This is the way
upvoted 2 times
...
...
Chipless
Most Recent 1 month, 4 weeks ago
Selected Answer: D
In an inference-based assessment, scanning starts by building an inventory of the protocols found on the machine. After finding a protocol, the scanning process starts to detect which ports are attached to services, such as an email server, web server, or database server. After finding services, it selects vulnerabilities on each machine and starts to execute only those relevant tests. SOURCE: CEH v12 eBook Module 5 pg 375
upvoted 3 times
...
Juice98
1 month, 4 weeks ago
Selected Answer: D
▪ Inference-Based Assessment In an inference-based assessment, scanning starts by building an inventory of the protocols found on the machine. After finding a protocol, the scanning process starts to detect which ports are attached to services, such as an email server, web server, or database server. After finding services, it selects vulnerabilities on each machine and starts to execute only those relevant tests.
upvoted 4 times
...
cybershortie
4 months, 1 week ago
D. Inference-based assessment starts with building inventory of protocols
upvoted 1 times
...
Nicknp
6 months, 2 weeks ago
Selected Answer: D
Option D
upvoted 1 times
...
kikour
7 months, 2 weeks ago
Selected Answer: A
detect which ports are attached to services such as an email server, a web server, or a database server It's finding for services
upvoted 1 times
...
[Removed]
11 months, 1 week ago
Selected Answer: D
D. Inference-based assessment. This was a question for me when I took the exam on 13 Dec 2023.
upvoted 3 times
...
insaniunt
12 months ago
Selected Answer: D
D. Inference-based assessment
upvoted 1 times
...
IPconfig
1 year ago
Selected Answer: D
Inference-Based Assessment In an inference-based assessment, scanning starts by building an inventory of the protocols found on the machine. After finding a protocol, the scanning process starts to detect which ports are attached to services, such as an email server, web server, or database server. After finding services, it selects vulnerabilities on each machine and starts to execute only those relevant tests Service-Based Solutions Service-based solutions are offered by third parties, such as auditing or security consulting firms. Some solutions are hosted inside the network, while others are hosted outside the network. A drawback of this solution is that attackers can audit the network from the outside
upvoted 2 times
...
N00b1e
1 year, 1 month ago
Selected Answer: D
Tree-based Assessment is the approach in which auditor follows different strategies for each component of an environment Inference-based Assessment is the approach to assist depending on the inventory of protocols in an environment Source: https://github.com/g0rbe/CEH/blob/master/05_Vulnerability_Analysis.md
upvoted 2 times
...
insaniunt
1 year, 3 months ago
Selected Answer: A
In this scenario, James built an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server, or a database server. He then selected the vulnerabilities on each machine and executed only the relevant tests based on the services identified. This approach is characteristic of service-based solutions, where the vulnerability assessment is focused on specific services running on the machines.
upvoted 3 times
...
Harrysphills
1 year, 5 months ago
A. Service-based solutions In a service-based vulnerability assessment, the focus is on identifying vulnerabilities associated with specific services or protocols running on the organization's machines. James built an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as email server, web server, or database server. He then selected the vulnerabilities specific to each machine and executed relevant tests targeting those services. This approach allows for a more targeted and efficient assessment, focusing on the vulnerabilities associated with the identified services.
upvoted 1 times
...
teenwolf18
1 year, 6 months ago
inference-based assessment: scanning starts by building an inventory of the protocols found on the machine.
upvoted 1 times
...
ptrckm
1 year, 7 months ago
Selected Answer: D
D. Inference-based assessment "In this approach, we pre-provide the tool with services and protocols found on the machine. The tool starts the scanning process to detect the ports attached to services... Once it finds the services, it scans only the provided services for vulnerabilities." according to https://www.linkedin.com/pulse/various-approaches-involved-vulnerability-assessment-solutions-aghao?trk=pulse-article_more-articles_related-content-card
upvoted 3 times
...
eli117
1 year, 7 months ago
Selected Answer: A
A. Service-based solutions Service-based solutions are a type of vulnerability assessment solution that focus on identifying the services and protocols that are running on a network or system. This involves building an inventory of the protocols found on the organization's machines in order to detect which ports are attached to services such as an email server, a web server, or a database server. Once the services have been identified, the vulnerabilities on each machine are selected, and only the relevant tests are executed. Option B (Product-based solutions) involves assessing the security of specific products or applications, such as operating systems or web applications. Option C (Tree-based assessment) and option D (Inference-based assessment) are not recognized types of vulnerability assessment solutions.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...