Which of the following network vulnerability scan indicators BEST validates a successful, active scan?

Which of the following network vulnerability scan indicators BEST validates a successful, active scan?
A. The scan job is scheduled to run during off-peak hours.
B. The scan output lists SQL injection attack vectors.
C. The scan data identifies the use of privileged-user credentials.
D. The scan results identify the hostname and IP address.

How To Pass SY0-601 Exam?

CompTIA SY0-601 PDF dumps.

High quality SY0-601 pdf and software. VALID exam to help you pass.

comptia-exams

2 thoughts on “Which of the following network vulnerability scan indicators BEST validates a successful, active scan?

  1. Ok, this is very confusing.
    How can a host name and ip address be considered as a successful scan ? I do not need a vulnerability scan to get those.
    What is an active scan, vs a passive scan. How is that different from intrusive and non intrusife, and credentialed vs non credentialed ? I did not find any place that really explains all these clearly.
    I would think the answer is C.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.