ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 294 - CS0-003 discussion

Report
Export

A security analyst has prepared a vulnerability scan that contains all of the company's functional subnets. During the initial scan, users reported that network printers began to print pages that contained unreadable text and icons.

Which of the following should the analyst do to ensure this behavior does not oocur during subsequent vulnerability scans?

A.
Perform non-credentialed scans.
Answers
A.
Perform non-credentialed scans.
B.
Ignore embedded web server ports.
Answers
B.
Ignore embedded web server ports.
C.
Create a tailored scan for the printer subnet.
Answers
C.
Create a tailored scan for the printer subnet.
D.
Increase the threshold length of the scan timeout.
Answers
D.
Increase the threshold length of the scan timeout.
Suggested answer: C

Explanation:

The best way to prevent network printers from printing pages during a vulnerability scan is to create a tailored scan for the printer subnet that excludes the ports and services that trigger the printing behavior. The other options are not effective for this purpose: performing non-credentialed scans may not reduce the impact on the printers; ignoring embedded web server ports may not cover all the possible ports that cause printing; increasing the threshold length of the scan timeout may not prevent the printing from occurring.

According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition1, one of the objectives for the exam is to ''use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities''. The book also covers the usage and syntax of vulnerability scanning tools, such as Nessus, Nmap, and Qualys, in chapter 4. Specifically, it explains the meaning and function of each component in vulnerability scanning, such as credentialed vs. non-credentialed scans, port scanning, and scan scheduling1, pages 149-160. It also discusses the common issues and challenges of vulnerability scanning, such as network disruptions, false positives, and scan scope1, pages 161-162. Therefore, this is a reliable source to verify the answer to the question.

asked 02/10/2024
Sullivan Dabireau
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first