exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 31 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 31
Topic #: 1
[All 312-50v13 Questions]

John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.
What is the type of vulnerability assessment tool employed by John in the above scenario?

  • A. Agent-based scanner
  • B. Network-based scanner
  • C. Cluster scanner
  • D. Proxy scanner
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Poornima023
1 week, 1 day ago
Selected Answer: A
Agent-based scanners reside on a single machine but can scan several devices on the same network.
upvoted 2 times
...
getaseadsss
1 month ago
Selected Answer: B
Attacker is clearly using network scanning
upvoted 2 times
...
LeonardoLira
1 month ago
Selected Answer: A
No cenário descrito, o hacker instalou o scanner em uma máquina comprometida e a usou para escanear outras máquinas na rede. Isso corresponde exatamente ao funcionamento de um agent-based scanner, que coleta informações sobre múltiplos dispositivos a partir de um único ponto. Não pode ser o um network-based scanner interage apenas com a máquina onde está instalado e gera o relatório nela mesma. Pagina 337 material oficila da EC COUNCIL
upvoted 1 times
...
killwitch
1 month ago
Selected Answer: B
B. Network-based scanner. A network-based scanner is a tool that scans multiple machines within a network to identify vulnerabilities. It operates by probing network devices, servers, and workstations to detect weaknesses such as open ports, misconfigurations, and outdated software that can be exploited. In this scenario: 1. A scanner is installed on a machine within the organization’s network. 2. It scans several machines on the same network to find vulnerabilities. 3. The attacker uses this information for further exploitation. Why not the others: A. Agent-based scanner – Requires agents installed on each device for vulnerability scanning. The scenario does not mention this. C. Cluster scanner – Typically used for scanning clusters of servers or cloud environments, which is not specified here. D. Proxy scanner – Used for anonymizing scans and routing traffic through proxies, not for internal network scanning.
upvoted 1 times
...
Booict
1 month ago
Selected Answer: B
he attacker installed a scanner on one machine and used it to scan other machines on the network. This aligns more closely with the behavior of a network-based scanner, which is designed to scan multiple devices on a network from a central point
upvoted 2 times
...
Rangnarok
2 months, 2 weeks ago
Selected Answer: A
Module 5 - page 561 Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago