What is the type of...
 
Notifications
Clear all

What is the type of vulnerability assessment solution that James employed in the above scenario?

1 Posts
1 Users
0 Likes
79 Views
(@cainsmarshall)
Posts: 692
Noble Member
Topic starter
 

An organization is performing a vulnerability assessment tor mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests.

What is the type of vulnerability assessment solution that James employed in the above scenario?

  • A . Product-based solutions
    B. Tree-based assessment
    C. Service-based solutions
    D. inference-based assessment

Show Answer Hide Answer

Suggested Answer: D

Explanation:

In an inference-based assessment, scanning starts by building an inventory of the protocols found on the machine. After finding a protocol, the scanning process starts to detect which ports are attached to services, such as an email server, web server, or database server. After finding services, it selects vulnerabilities on each machine and starts to execute only those relevant tests.
 
Posted : 14/02/2023 5:10 am
Topic Tags

Latest EC-Council 312-50v12 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: