exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 149 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 149
Topic #: 1
[All 312-50v11 Questions]

An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests.
What is the type of vulnerability assessment solution that James employed in the above scenario?

  • A. Service-based solutions
  • B. Product-based solutions
  • C. Tree-based assessment
  • D. Inference-based assessment
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cerzocuspi
Highly Voted 2 years ago
Answer is Correct. inference-based assessment. In an inference-based assessment, scanning starts by building an inventory of the protocols found on the machine. After finding a protocol, the scanning process starts to detect which ports are attached to services, such as an email server, web server, or database server. After finding services, it selects vulnerabilities on each machine and starts to execute only those relevant tests. (EC-Council 533)
upvoted 25 times
...
KumaraRashu
Highly Voted 1 year, 3 months ago
Product based solution vs Service based solution Product based solutions are deployed within the network. Usually dedicated for internal network. Service based solutions are third-party solutions which offers security and auditing. This can be host either inside or outside the network. This can be a security risk of being compromised. Tree-based Assessment vs Inference-based Assessment Tree-based Assessment is the approach in which auditor follows different strategies for each component of an environment Inference-based Assessment is the approach to assist depending on the inventory of protocols in an environment
upvoted 11 times
...
Daniel8660
Most Recent 6 months, 2 weeks ago
Selected Answer: D
Vulnerability Assessment Solutions and Tools , Inference-Based Assessment Inference-based scanning starts by building an inventory of the protocols found on the machine. After finding a protocol, the scanning process starts to detect which ports are attached to services, such as an email server, web server, or database server. After finding services, it selects vulnerabilities on each machine and starts to execute only those relevant tests. (P.533/517)
upvoted 7 times
...
ANDRESCB1988
1 year, 9 months ago
correct
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago