Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 31 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 31
Topic #: 1
[All 312-50v12 Questions]

John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.
What is the type of vulnerability assessment tool employed by John in the above scenario?

  • A. Agent-based scanner
  • B. Network-based scanner
  • C. Cluster scanner
  • D. Proxy scanner
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jeremy13
Highly Voted 1 year, 7 months ago
Selected Answer: A
A. Agent-based scanner Module 05/P561 CEH bookV12 *Network-Based Scanner: Network-based scanners are those that interact only with the real machine where they reside and give the report to the same machine after scanning. *Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network. *Proxy Scanner: Proxy scanners are the network-based scanners that can scan networks from any machine on the network. * Cluster scanner: Cluster scanners are similar to proxy scanners, but they can simultaneously perform two or more scans on different machines in the network.
upvoted 20 times
...
eli117
Highly Voted 1 year, 7 months ago
Selected Answer: B
B. Network-based scanner Explanation: In the given scenario, John employs a network-based scanner to identify vulnerabilities on the machines in the same network. A network-based scanner is a type of vulnerability assessment tool that scans the network for vulnerabilities and identifies security holes in the network devices and systems. It is a non-intrusive scanner that can detect vulnerabilities without accessing the system. It sends packets to the network and analyzes the response to identify vulnerabilities.
upvoted 5 times
best2000
1 year, 6 months ago
you would have been right is the was no installing. the question said the scanner was installed on a machine. the right answer is A
upvoted 5 times
...
...
ametah
Most Recent 5 months, 1 week ago
Selected Answer: A
Listed below are some of the location and data examination tools: o Network-Based Scanner: Network-based scanners are those that interact only with the real machine where they reside and give the report to the same machine after scanning. o Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network. o Proxy Scanner: Proxy scanners are the network-based scanners that can scan networks from any machine on the network. o Cluster scanner: Cluster scanners are similar to proxy scanners, but they can simultaneously perform two or more scans on different machines in the network
upvoted 1 times
...
zarrrzz
5 months, 2 weeks ago
Selected Answer: B
The most appropriate choice is: B. Network-based scanner. Explanation: Agent-based scanner: This typically involves installing software agents on each target machine to perform vulnerability assessments. It doesn't fit the scenario where a scanner is installed on one machine and used to scan others. Network-based scanner: This is a scanner that examines network traffic or directly probes other machines on the network to identify vulnerabilities. It matches the scenario where a scanner was installed on a machine and used to scan other machines on the same network. Cluster scanner: This is less commonly referred to in the context of vulnerability assessment tools and usually pertains to managing and scanning clusters of machines, but not in the specific way described. Proxy scanner: This typically involves using a proxy to scan web traffic, and is not relevant to the scenario described.
upvoted 3 times
...
zarrrzz
5 months, 2 weeks ago
The most appropriate choice is: B. Network-based scanner. Explanation: Agent-based scanner: This typically involves installing software agents on each target machine to perform vulnerability assessments. It doesn't fit the scenario where a scanner is installed on one machine and used to scan others. Network-based scanner: This is a scanner that examines network traffic or directly probes other machines on the network to identify vulnerabilities. It matches the scenario where a scanner was installed on a machine and used to scan other machines on the same network. Cluster scanner: This is less commonly referred to in the context of vulnerability assessment tools and usually pertains to managing and scanning clusters of machines, but not in the specific way described. Proxy scanner: This typically involves using a proxy to scan web traffic, and is not relevant to the scenario described.
upvoted 1 times
...
Lost_Memo
6 months, 2 weeks ago
Selected Answer: B
I Believe the answer is B as I understand how you are using the key word install, to run an agent-based scan all the machines involved need have the agent installed on them to do the scan, while network scan requires connectivity, and this scenario I do not think the attacker has access to any other device to install the agents.
upvoted 1 times
...
desertlotus1211
7 months, 2 weeks ago
Though the scanner software was installed on a victims machine... Actually a network based scanner is being performed to identify vulnerabilities on the network and on the other machines. Agent based scanner would be installed a on machine BUT will send information about THAT machine to a central repo. This is not happening in this scenario.
upvoted 1 times
desertlotus1211
7 months, 2 weeks ago
Agent-based scanning is a type of vulnerability scanning that involves installing a software agent on each system that needs to be scanned. The agent then monitors and reports on the system's status, enabling real-time data collection and analysis.
upvoted 2 times
...
...
jettguo
8 months, 1 week ago
Selected Answer: B
My answer is network-base scanner. Reason 1: although an "agent" is installed on a victim machine, there is no mention of using this scanner to scan for vulnerability on this victim machine. Reason 2: The "agent" was used to scan on machines within the network, this fits the signature of a "network-based scanner"
upvoted 1 times
...
sh4dali
8 months, 3 weeks ago
Selected Answer: A
A. Agent based. "installed a scanner on a machine" keyword is on a machine.
upvoted 1 times
...
barey
9 months, 2 weeks ago
GPT4: B. Network-based scanner In the scenario described, the professional hacker is using a network-based scanner. This type of scanner is deployed on a network and scans multiple machines on that network to identify potential vulnerabilities without being installed on each individual machine. Network-based scanners are commonly used to assess security posture and identify vulnerabilities that could be exploited.
upvoted 1 times
...
yasso2023
10 months, 2 weeks ago
Selected Answer: A
In the scenario described, where the hacker installed a scanner on a machine within the victim's network and scanned several machines on the same network, it aligns more closely with an Agent-Based Scanner. Agent-based scanners reside on a single machine but can scan several machines on the same network.
upvoted 1 times
...
yasso2023
10 months, 2 weeks ago
In the scenario described, where the hacker installed a scanner on a machine within the victim's network and scanned several machines on the same network, it aligns more closely with an Agent-Based Scanner. Agent-based scanners reside on a single machine but can scan several machines on the same network.
upvoted 1 times
...
HetBeest
11 months, 2 weeks ago
None-of-the-above would have been my answer. John didn't employ anything (himself).
upvoted 1 times
...
4MM449
11 months, 2 weeks ago
Selected Answer: A
A. Agent-based scanner
upvoted 1 times
...
insaniunt
1 year ago
Selected Answer: A
page 561 from CEH v12 book: Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network. A. Agent-Based Scanner
upvoted 1 times
...
AA_Ron
1 year ago
Selected Answer: B
ChatGPT, Bard, Perplexity all using the Tree of Thought answering said B. A.I. = from Gods mouth to my ears. (Robot ears)
upvoted 2 times
...
davitm
1 year ago
B. Network-based scanner Agent-based scanners can reside on a single machine and scan several machines on the same network. Agent-based scanners typically involve installing a scanning agent or software component on each target machine that you want to scan. These agents communicate with a central management system or console, which controls and coordinates the scanning process. The central console can initiate scans on multiple machines across the network, making it possible to scan multiple systems from a single machine where the console is installed. This approach provides more control and flexibility, as you can customize scanning options for each target machine and collect detailed information. However, it requires installing agents on each target system, which can be resource-intensive and may not be suitable for all scenarios.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...