312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 12


A newly joined employee, Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors.

What is the type of vulnerability assessment performed by Martin?

Show Answer
Correct Answer: B

A host-based assessment focuses on evaluating the security of an individual system or host. The described assessment includes checking user directories, registries, system parameters, configuration tables, registry and file permissions, and software configuration errors. These activities are consistent with a host-based assessment, which seeks to identify specific vulnerabilities and misconfigurations in the host system.

Discussion

12 comments
Sign in to comment
Harrysphills
May 31, 2024

The type of vulnerability assessment performed by Martin is: B. Host-based assessment In a host-based assessment, the focus is on evaluating the security of an individual system or host. Martin assessed the allocated system by examining user directories, registries, system parameters, native configuration tables, registry or file permissions, and software configuration errors. This type of assessment helps identify vulnerabilities specific to the host, including misconfigurations, insecure settings, and potential avenues for compromise. It aims to ensure the security and integrity of the individual system being assessed.

kimsteveOption: B
Nov 29, 2024

Host-based assessments are a type of security check that involve conducting a configuration-level check to identify system configurations, user directories, file systems, registry settings, and other parameters to evaluate the possibility of compromise. These assessments check the security of a particular network or server. Host-based scanners assess systems to identify vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors. Host-based assessments use many commercial and open-source scanning tools.

RobertVidalOption: B
Jan 21, 2025

Conducts a configuration-level check to identify system configurations, user directories, file systems, registry settings,etc., to evaluate the possibility of compromise. (pag. 553, module 5 Vulnerability Analysis)

BallCSOption: B
Jan 22, 2025

He also identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors.

eli117Option: B
Apr 4, 2024

B. Host-based assessment A host-based assessment is a type of vulnerability assessment that focuses on individual computer systems or hosts. It involves examining the configuration, settings, and software installed on the host to identify vulnerabilities that could be exploited by attackers.

jeremy13Option: B
May 3, 2024

B. Host-based assessment Like V11 Q245

naija4lifeOption: C
Jul 3, 2024

C. Credentialed assessment Credentialed scans require administrative access to the systems being scanned and are performed using the same credentials and privileges as an administrative user. The scans perform a thorough examination of the system, looking for vulnerabilities that could be exploited by a malicious attacker.

amomyty
Jul 12, 2024

C. Credentialed assessment

jks945797Option: B
Aug 11, 2024

B. Host-based assessment

vargasamsonOption: B
Oct 18, 2024

B. Host-based assessment Martin definitely investigate one concrate machine, which is a host-based assessment.

insaniuntOption: B
Nov 26, 2024

B. Host-based assessment

Mann098Option: B
Dec 27, 2024

host-based assessment, as the vulnerabilities analyzed (directories, registries, configuration errors) pertain to a specific host system