Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 85

A systems administrator is preparing to run a vulnerability scan on a set of information systems in the organization. The systems administrator wants to ensure that the targeted systems produce accurate information especially regarding configuration settings.

Which of the following scan types will provide the systems administrator with the MOST accurate information?

    Correct Answer: D

    An active, credentialed scan is the most accurate method for obtaining detailed configuration settings and vulnerabilities from target systems. Active scanning directly interacts with the systems, thoroughly probing them for vulnerabilities. Using credentials allows the scan to access in-depth information as if it were a legitimate user, which provides a complete and accurate picture of the system's security posture and configuration settings. Non-credentialed and passive scans are less comprehensive because they either do not interact directly with the systems or do not have the necessary access to gather all relevant information.

Discussion
adamwellaOption: D

If you know have experience doing scans you would know credential scans are not passive.

klosinskil

Agree. If u want config its active cred so D

kycuguOption: D

Passive - not directly interact wih the target e.g using shodan and censys active - directly interact with the target so answer is Active scan

ryanzouOption: D

D is the answer

BiteSizeOption: D

Done these plenty of times. Nessus and Nexpose Active Credentialed Scans give the most and best information. Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)

JohnWHOption: D

D is my answer: Credential-based vulnerability assessment, which make use of the admin account, do a more thorough check by looking for problems that cannot be seen from the network. On the other hand, non-credentialed scans provide a quick view of vulnerabilities by only looking at network services exposed by the host.

RevZig67Option: D

For a list of systems that you want configuration settings, I would think a credentialed active scan would be best

snilu

https://ieeexplore.ieee.org/document/9654331 "According to total amount of accuracy and precision, the PVD results are higher than AVS."

Ameraka

Its A passive is more accurate on snilu link

ts260

How can a passive scan be credentialed? A passive scan does not send data

adamwella

exactly..

23169fdOption: D

Active Scan: This type of scan actively probes the systems to identify vulnerabilities and configuration settings. It can test the systems more thoroughly by interacting directly with them. Credentialed Scan: Using credentials allows the scan to access the system with the same permissions as a legitimate user. This enables the scanner to check deeper into the system's configuration, installed software, and other details that are not visible to a non-credentialed scan.

hidadyOption: D

D is the correct answer

babyface3Option: A

The only reason I can see that they would come up with A is because of this definition of passive scanning. Passive scanning is a method of vulnerability detection that relies on information gleaned from network data that is captured from a target computer without direct interaction.