Which assessment starts by building an inventory of protocols on the machine, then detects ports attached to services, and finally selects vulnerabilities to test?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which assessment starts by building an inventory of protocols on the machine, then detects ports attached to services, and finally selects vulnerabilities to test?

Explanation:
This question is about a structured, discovery-first testing approach that builds a map of what a machine offers before deciding what to test. In a tree-based assessment, you start by inventorying the protocols and services visible on the target—essentially listing what ports are open and which services are advertised. Next, you identify exactly which services are running on those ports, often by probing and banner grabbing to learn version details. With that service inventory, you then map to known vulnerabilities and select the appropriate tests or exploits to try. This creates a logical, branching plan: discovered service A points to vuln set X and Y, service B points to vuln set Z, and so on. The described sequence—inventory protocols, detect ports tied to services, then choose vulnerabilities to test—fits this approach precisely. Credentialed and non-credentialed assessments differ because they hinge on access rights to the target to reveal deeper details; the process described doesn’t rely on authenticated access, so it’s not about those types. Host-based vulnerability assessment tools focus on scanning a single host from within that host or from an installed agent, rather than the broader process of mapping network-visible protocols and services followed by vulnerability selection. In short, the method described aligns with a tree-based assessment, where discovery leads to service identification, which then drives vulnerability testing.

This question is about a structured, discovery-first testing approach that builds a map of what a machine offers before deciding what to test. In a tree-based assessment, you start by inventorying the protocols and services visible on the target—essentially listing what ports are open and which services are advertised. Next, you identify exactly which services are running on those ports, often by probing and banner grabbing to learn version details. With that service inventory, you then map to known vulnerabilities and select the appropriate tests or exploits to try. This creates a logical, branching plan: discovered service A points to vuln set X and Y, service B points to vuln set Z, and so on. The described sequence—inventory protocols, detect ports tied to services, then choose vulnerabilities to test—fits this approach precisely.

Credentialed and non-credentialed assessments differ because they hinge on access rights to the target to reveal deeper details; the process described doesn’t rely on authenticated access, so it’s not about those types. Host-based vulnerability assessment tools focus on scanning a single host from within that host or from an installed agent, rather than the broader process of mapping network-visible protocols and services followed by vulnerability selection.

In short, the method described aligns with a tree-based assessment, where discovery leads to service identification, which then drives vulnerability testing.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy