312-50v13 Exam QuestionsBrowse all questions from this exam

312-50v13 Exam - Question 29


John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.

What is the type of vulnerability assessment tool employed by John in the above scenario?

Show Answer
Correct Answer:

Discussion

10 comments
Sign in to comment
BooictOption: B
Feb 27, 2025

he attacker installed a scanner on one machine and used it to scan other machines on the network. This aligns more closely with the behavior of a network-based scanner, which is designed to scan multiple devices on a network from a central point

getaseadsssOption: B
Mar 2, 2025

Attacker is clearly using network scanning

Poornima023Option: A
Mar 26, 2025

Agent-based scanners reside on a single machine but can scan several devices on the same network.

RangnarokOption: A
Jan 15, 2025

Module 5 - page 561 Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network.

killwitchOption: B
Feb 28, 2025

B. Network-based scanner. A network-based scanner is a tool that scans multiple machines within a network to identify vulnerabilities. It operates by probing network devices, servers, and workstations to detect weaknesses such as open ports, misconfigurations, and outdated software that can be exploited. In this scenario: 1. A scanner is installed on a machine within the organization’s network. 2. It scans several machines on the same network to find vulnerabilities. 3. The attacker uses this information for further exploitation. Why not the others: A. Agent-based scanner – Requires agents installed on each device for vulnerability scanning. The scenario does not mention this. C. Cluster scanner – Typically used for scanning clusters of servers or cloud environments, which is not specified here. D. Proxy scanner – Used for anonymizing scans and routing traffic through proxies, not for internal network scanning.

LeonardoLiraOption: A
Feb 28, 2025

No cenário descrito, o hacker instalou o scanner em uma máquina comprometida e a usou para escanear outras máquinas na rede. Isso corresponde exatamente ao funcionamento de um agent-based scanner, que coleta informações sobre múltiplos dispositivos a partir de um único ponto. Não pode ser o um network-based scanner interage apenas com a máquina onde está instalado e gera o relatório nela mesma. Pagina 337 material oficila da EC COUNCIL

jonekoolOption: A
Apr 14, 2025

Based on EC - COuncil Material

jonekoolOption: B
Apr 22, 2025

Network scanner scans other machines on the network to identify vulnerabilities.

mulekuleOption: B
Apr 24, 2025

In agent base scan, each device to be scanned must have an agent installed on it. The question said a scanner (not an agent) was installed on a machine and used to scan other devices. The question did not state that the scanned devices had agent installed, hence, B is correct.

CherubaelOption: B
Apr 28, 2025

CEH Textbook says: network-based scanners scan a network from a remote location, while agent-based scanners require a dedicated software agent to be installed on EACH TARGET MACHINE for scanning. That means every host will need to have the agent installed, whereas network-based scanner (i.e. Nessus) doesn't require an agent.