0% found this document useful (0 votes)
7 views3 pages

Lab 5

Uploaded by

Wilson Quek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views3 pages

Lab 5

Uploaded by

Wilson Quek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

12/6/24, 2:51 AM labclient.labondemand.

com/Instructions/ExamResult/6f5d0069-690b-487b-94b2-7b2e90f9cdde

10: Assisted Lab: Performing Vulnerability Scanning


CySA+ (Exam CS0-003)

10/10
Congratulations, you passed!
Duration: 10 minutes, 18 seconds

 Which of the following are true regarding configuring a scan target? (Select all that Score: 1
apply)

Hosts can be imported from a file


Reverse lookups can be enabled (i.e., DNS)
Hosts can be excluded from the selected hosts
Ports can be limited to TCP only, TCP and UDP, or TCP and the top 100 nmap UDP
Host order randomization is enabled by default
There are numerous discovery or alive test options
Only RFC 1918 addresses are supported

Congratulations, you have answered the question correctly.

 Validate MS10 target Score: 1


Select the Score button to validate this task:
Target found ...
Task complete

 What types of credentials can be defined for a scan target? (Select all that apply) Score: 1

SSH
TLS
SMB
SMTP
ESXi
SNMP
LDAP

Congratulations, you have answered the question correctly.

 Validate MS10 with credential target Score: 1


Select the Score button to validate this task:
Target with credential found ...
Note that the username and password have not been verified ...
Task complete

https://labclient.labondemand.com/Instructions/ExamResult/6f5d0069-690b-487b-94b2-7b2e90f9cdde 1/3
12/6/24, 2:51 AM labclient.labondemand.com/Instructions/ExamResult/6f5d0069-690b-487b-94b2-7b2e90f9cdde

 Which of the following are other options available for a scan task? (Select all that Score: 1
apply)

Alerts
Randomized start times
Schedule
Delete older reports
Run when system is idle
Network interface

Congratulations, you have answered the question correctly.

 GSA (a.k.a. GVM or OpenVAS) can be used to evaluate which of the following? Score: 1

websites
databases
private network systems
hosts over the internet
all of the above
Congratulations, you have answered the question correctly.

 What port is by the GSA web UI? Score: 1

9392
9292
9300
9999
Congratulations, you have answered the question correctly.

 What vulnerability scan has the greatest potential to discover system weaknesses? Score: 1

offline scan
credentialed scan
survey scan
discovery scan
uncredentialed scan
port scan

Congratulations, you have answered the question correctly.

 Which of the following are other options available to define in the Configuration menu Score: 1
of GSA? (Select all that apply)

Port Lists
Credentials
OS Types
Alerts
Load Balancing Techniques

Congratulations, you have answered the question correctly.

https://labclient.labondemand.com/Instructions/ExamResult/6f5d0069-690b-487b-94b2-7b2e90f9cdde 2/3
12/6/24, 2:51 AM labclient.labondemand.com/Instructions/ExamResult/6f5d0069-690b-487b-94b2-7b2e90f9cdde

 In addition to the manual definition of hosts, what other technique can be used to set Score: 1
the targets of a scan?
Auto focus
Random selection
Pull from a file
Fuzzy discovery

Congratulations, you have answered the question correctly.

https://labclient.labondemand.com/Instructions/ExamResult/6f5d0069-690b-487b-94b2-7b2e90f9cdde 3/3

You might also like