Exam PT0-002 All QuestionsBrowse all questions from this exam
Question 113

A company has recruited a penetration tester to conduct a vulnerability scan over the network. The test is confirmed to be on a known environment. Which of the following would be the BEST option to identify a system properly prior to performing the assessment?

    Correct Answer: A

    An asset inventory is the most effective way to identify all systems properly prior to conducting a vulnerability assessment. It includes a comprehensive list of all hardware and software assets within the network, providing detailed information such as IP addresses, hostnames, operating systems, and installed applications. This ensures that the vulnerability scan can be accurately tailored to the specific systems in the environment, making it the best option for a known environment.

Discussion
ManzerOption: A

It's on a known environment and it's prior to the test.

RRabbitOption: A

A. Asset inventory An asset inventory is a comprehensive list of all the hardware and software assets within an organization's network. It includes information such as IP addresses, hostnames, operating systems, and installed software. This information can be used to identify systems properly prior to performing the assessment. Option B, DNS records, will give information on the domain name resolution, it can give some information on the assets but will not be sufficient to identify all the systems and their configurations. Option C, Web-application scan, will give information on the web applications on the organization's network, but will not cover all the systems. Option D, full scan, will give a lot of information but will be time-consuming and may not be necessary for identifying all the systems in a known environment.

NotAHackerJustYetOption: A

The BEST option to identify a system properly prior to performing the assessment is A. Asset inventory. An asset inventory is a comprehensive listing of all of the information technology assets that a company owns or uses. This includes hardware, software, databases, networks, and other important systems. It is important to know what assets a company has so that a vulnerability scan can be properly tailored to identify the correct systems and their associated vulnerabilities. B. DNS records is incorrect because DNS records do not provide information on what systems are in the environment, only the domain name associated with the environment. C. Web-application scan is incorrect because a web-application scan does not provide information on what systems are in the environment, only the web applications associated with the environment. D. Full scan is incorrect because a full scan will not provide information on what systems are in the environment, only any potential vulnerabilities that may exist.

nickwen007Option: A

: The best option for identifying a system properly prior to performing the assessment would be A. Asset inventory. An asset inventory lists all the hardware and software assets a network possesses, which can be used to identify systems properly prior to conducting a vulnerability scan.

kloug

aaaaaaaaaa

funkhaus

Many vulnerability scanners can do a ping sweep and identify assets on the network. I would think D could be the right answer as well because new systems are always being added to the network.

[Removed]

A is correct anwer

Etc_Shadow28000Option: A

• B. While DNS records can provide information about hostnames and IP addresses, they may not be complete and might miss devices not registered in DNS. DNS records also do not provide detailed information about the type and configuration of the systems. • C. This is specific to web applications and does not cover the entire network environment. It also focuses on identifying vulnerabilities in web applications rather than providing a comprehensive overview of all systems. • D. Conducting a full scan can identify systems on the network, but it may not provide detailed information about each system. Additionally, without prior knowledge of the environment, a full scan might be time-consuming and could cause disruptions if not carefully managed. Therefore, asset inventory is the best option to properly identify systems before performing a vulnerability assessment, as it provides the most detailed and comprehensive information about the network environment.

AlizadeOption: A

Answer= A