Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 54 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 54
Topic #: 1
[All 312-50v12 Questions]

Jude, a pen tester, examined a network from a hacker’s perspective to identify exploits and vulnerabilities accessible to the outside world by using devices such as firewalls, routers, and servers. In this process, he also estimated the threat of network security attacks and determined the level of security of the corporate network.
What is the type of vulnerability assessment that Jude performed on the organization?

  • A. Application assessment
  • B. External assessment
  • C. Passive assessment
  • D. Host-based assessment
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Vincent_Lu
Highly Voted 1 year, 5 months ago
B. External assessment ------------------------------------------- Application assessment: It evaluates specific software applications to identify vulnerabilities and weaknesses that could be exploited by attackers. External assessment: It assesses the security of external systems and networks from an external perspective to identify vulnerabilities and security weaknesses. Passive assessment: It evaluates security by monitoring and analyzing network traffic and system behavior without directly interacting with the system. Host-based assessment: It evaluates the security of individual hosts or servers by inspecting their configuration, patches, and security policies.
upvoted 9 times
...
sunce12
Most Recent 5 months, 1 week ago
B. External assessment
upvoted 1 times
...
insaniunt
11 months, 3 weeks ago
Selected Answer: B
B. External assessment -
upvoted 1 times
...
kukuh
1 year, 1 month ago
Selected Answer: B
B. External assessment
upvoted 1 times
...
581777a
1 year, 3 months ago
Selected Answer: B
B. External assessment
upvoted 1 times
...
eli117
1 year, 7 months ago
Selected Answer: B
B. External assessment Explanation: The scenario describes a type of vulnerability assessment where a pen tester (Jude) examines a network from a hacker's perspective to identify exploits and vulnerabilities that are accessible to the outside world, such as through firewalls, routers, and servers. This type of assessment is called an external assessment. External assessments are designed to simulate an attack from an external threat actor, such as a hacker or cybercriminal. The focus is on identifying vulnerabilities that are accessible from the Internet, such as open ports, unpatched software, weak passwords, and misconfigured systems. External assessments typically involve a combination of automated scanning tools and manual testing techniques. The objective is to determine the level of security of the corporate network and estimate the threat of network security attacks.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...