ECCouncil Certified Ethical Hacker Exam (CEH v11) 312-50v11 Question # 19 Topic 2 Discussion

ECCouncil Certified Ethical Hacker Exam (CEH v11) 312-50v11 Question # 19 Topic 2 Discussion

312-50v11 Exam Topic 2 Question 19 Discussion:
Question #: 19
Topic #: 2

An organization is performing a vulnerability assessment tor mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the above scenario?


A.

Product-based solutions


B.

Tree-based assessment


C.

Service-based solutions


D.

inference-based assessment


Get Premium 312-50v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.