312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 31


John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.

What is the type of vulnerability assessment tool employed by John in the above scenario?

Show Answer
Correct Answer: A

The correct type of vulnerability assessment tool employed by John is an agent-based scanner. An agent-based scanner resides on a single machine and can scan several machines on the same network. This fits the scenario described in which the hacker installed a scanner on a single machine within the victim's network and then used it to scan other machines on the same network for vulnerabilities.

Discussion

17 comments
Sign in to comment
jeremy13Option: A
Apr 10, 2023

A. Agent-based scanner Module 05/P561 CEH bookV12 *Network-Based Scanner: Network-based scanners are those that interact only with the real machine where they reside and give the report to the same machine after scanning. *Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network. *Proxy Scanner: Proxy scanners are the network-based scanners that can scan networks from any machine on the network. * Cluster scanner: Cluster scanners are similar to proxy scanners, but they can simultaneously perform two or more scans on different machines in the network.

eli117Option: B
Apr 4, 2023

B. Network-based scanner Explanation: In the given scenario, John employs a network-based scanner to identify vulnerabilities on the machines in the same network. A network-based scanner is a type of vulnerability assessment tool that scans the network for vulnerabilities and identifies security holes in the network devices and systems. It is a non-intrusive scanner that can detect vulnerabilities without accessing the system. It sends packets to the network and analyzes the response to identify vulnerabilities.

best2000
May 2, 2023

you would have been right is the was no installing. the question said the scanner was installed on a machine. the right answer is A

zarrrzzOption: B
Jun 13, 2024

The most appropriate choice is: B. Network-based scanner. Explanation: Agent-based scanner: This typically involves installing software agents on each target machine to perform vulnerability assessments. It doesn't fit the scenario where a scanner is installed on one machine and used to scan others. Network-based scanner: This is a scanner that examines network traffic or directly probes other machines on the network to identify vulnerabilities. It matches the scenario where a scanner was installed on a machine and used to scan other machines on the same network. Cluster scanner: This is less commonly referred to in the context of vulnerability assessment tools and usually pertains to managing and scanning clusters of machines, but not in the specific way described. Proxy scanner: This typically involves using a proxy to scan web traffic, and is not relevant to the scenario described.

davitmOption: B
Oct 28, 2023

B. Network-based scanner Agent-based scanners can reside on a single machine and scan several machines on the same network. Agent-based scanners typically involve installing a scanning agent or software component on each target machine that you want to scan. These agents communicate with a central management system or console, which controls and coordinates the scanning process. The central console can initiate scans on multiple machines across the network, making it possible to scan multiple systems from a single machine where the console is installed. This approach provides more control and flexibility, as you can customize scanning options for each target machine and collect detailed information. However, it requires installing agents on each target system, which can be resource-intensive and may not be suitable for all scenarios.

AA_RonOption: B
Nov 20, 2023

ChatGPT, Bard, Perplexity all using the Tree of Thought answering said B. A.I. = from Gods mouth to my ears. (Robot ears)

insaniuntOption: A
Nov 26, 2023

page 561 from CEH v12 book: Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network. A. Agent-Based Scanner

4MM449Option: A
Dec 14, 2023

A. Agent-based scanner

HetBeest
Dec 15, 2023

None-of-the-above would have been my answer. John didn't employ anything (himself).

yasso2023Option: A
Jan 16, 2024

In the scenario described, where the hacker installed a scanner on a machine within the victim's network and scanned several machines on the same network, it aligns more closely with an Agent-Based Scanner. Agent-based scanners reside on a single machine but can scan several machines on the same network.

yasso2023Option: A
Jan 16, 2024

In the scenario described, where the hacker installed a scanner on a machine within the victim's network and scanned several machines on the same network, it aligns more closely with an Agent-Based Scanner. Agent-based scanners reside on a single machine but can scan several machines on the same network.

bareyOption: B
Feb 12, 2024

GPT4: B. Network-based scanner In the scenario described, the professional hacker is using a network-based scanner. This type of scanner is deployed on a network and scans multiple machines on that network to identify potential vulnerabilities without being installed on each individual machine. Network-based scanners are commonly used to assess security posture and identify vulnerabilities that could be exploited.

sh4daliOption: A
Mar 6, 2024

A. Agent based. "installed a scanner on a machine" keyword is on a machine.

jettguoOption: B
Mar 18, 2024

My answer is network-base scanner. Reason 1: although an "agent" is installed on a victim machine, there is no mention of using this scanner to scan for vulnerability on this victim machine. Reason 2: The "agent" was used to scan on machines within the network, this fits the signature of a "network-based scanner"

desertlotus1211Option: B
Apr 10, 2024

Though the scanner software was installed on a victims machine... Actually a network based scanner is being performed to identify vulnerabilities on the network and on the other machines. Agent based scanner would be installed a on machine BUT will send information about THAT machine to a central repo. This is not happening in this scenario.

desertlotus1211
Apr 10, 2024

Agent-based scanning is a type of vulnerability scanning that involves installing a software agent on each system that needs to be scanned. The agent then monitors and reports on the system's status, enabling real-time data collection and analysis.

Lost_MemoOption: B
May 12, 2024

I Believe the answer is B as I understand how you are using the key word install, to run an agent-based scan all the machines involved need have the agent installed on them to do the scan, while network scan requires connectivity, and this scenario I do not think the attacker has access to any other device to install the agents.

zarrrzzOption: B
Jun 13, 2024

The most appropriate choice is: B. Network-based scanner. Explanation: Agent-based scanner: This typically involves installing software agents on each target machine to perform vulnerability assessments. It doesn't fit the scenario where a scanner is installed on one machine and used to scan others. Network-based scanner: This is a scanner that examines network traffic or directly probes other machines on the network to identify vulnerabilities. It matches the scenario where a scanner was installed on a machine and used to scan other machines on the same network. Cluster scanner: This is less commonly referred to in the context of vulnerability assessment tools and usually pertains to managing and scanning clusters of machines, but not in the specific way described. Proxy scanner: This typically involves using a proxy to scan web traffic, and is not relevant to the scenario described.

ametahOption: A
Jun 21, 2024

Listed below are some of the location and data examination tools: o Network-Based Scanner: Network-based scanners are those that interact only with the real machine where they reside and give the report to the same machine after scanning. o Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network. o Proxy Scanner: Proxy scanners are the network-based scanners that can scan networks from any machine on the network. o Cluster scanner: Cluster scanners are similar to proxy scanners, but they can simultaneously perform two or more scans on different machines in the network