312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 54


Jude, a pen tester, examined a network from a hacker’s perspective to identify exploits and vulnerabilities accessible to the outside world by using devices such as firewalls, routers, and servers. In this process, he also estimated the threat of network security attacks and determined the level of security of the corporate network.

What is the type of vulnerability assessment that Jude performed on the organization?

Show Answer
Correct Answer: B

Jude performed an external assessment. This type of assessment focuses on examining the security of external systems and networks from an outside perspective, identifying vulnerabilities and exploits accessible to external attackers. It involves evaluating devices such as firewalls, routers, and servers to gauge the level of security and potential threats. This aligns with the process described, where Jude analyzed network components accessible to the outside world and estimated the threat level posed by network security attacks.

Discussion

6 comments
Sign in to comment
Vincent_LuOption: B
Jun 14, 2023

B. External assessment ------------------------------------------- Application assessment: It evaluates specific software applications to identify vulnerabilities and weaknesses that could be exploited by attackers. External assessment: It assesses the security of external systems and networks from an external perspective to identify vulnerabilities and security weaknesses. Passive assessment: It evaluates security by monitoring and analyzing network traffic and system behavior without directly interacting with the system. Host-based assessment: It evaluates the security of individual hosts or servers by inspecting their configuration, patches, and security policies.

eli117Option: B
Apr 4, 2023

B. External assessment Explanation: The scenario describes a type of vulnerability assessment where a pen tester (Jude) examines a network from a hacker's perspective to identify exploits and vulnerabilities that are accessible to the outside world, such as through firewalls, routers, and servers. This type of assessment is called an external assessment. External assessments are designed to simulate an attack from an external threat actor, such as a hacker or cybercriminal. The focus is on identifying vulnerabilities that are accessible from the Internet, such as open ports, unpatched software, weak passwords, and misconfigured systems. External assessments typically involve a combination of automated scanning tools and manual testing techniques. The objective is to determine the level of security of the corporate network and estimate the threat of network security attacks.

581777aOption: B
Aug 4, 2023

B. External assessment

kukuhOption: B
Oct 24, 2023

B. External assessment

insaniuntOption: B
Dec 10, 2023

B. External assessment -

sunce12Option: B
Jun 21, 2024

B. External assessment