Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CS0-003 Topic 3 Question 22 Discussion

Actual exam question for CompTIA's CS0-003 exam
Question #: 22
Topic #: 3
[All CS0-003 Questions]

A security analyst has prepared a vulnerability scan that contains all of the company's functional subnets. During the initial scan, users reported that network printers began to print pages that contained unreadable text and icons.

Which of the following should the analyst do to ensure this behavior does not oocur during subsequent vulnerability scans?

Show Suggested Answer Hide Answer
Suggested Answer: C

The best way to prevent network printers from printing pages during a vulnerability scan is to create a tailored scan for the printer subnet that excludes the ports and services that trigger the printing behavior. The other options are not effective for this purpose: performing non-credentialed scans may not reduce the impact on the printers; ignoring embedded web server ports may not cover all the possible ports that cause printing; increasing the threshold length of the scan timeout may not prevent the printing from occurring.


According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition1, one of the objectives for the exam is to ''use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities''. The book also covers the usage and syntax of vulnerability scanning tools, such as Nessus, Nmap, and Qualys, in chapter 4. Specifically, it explains the meaning and function of each component in vulnerability scanning, such as credentialed vs. non-credentialed scans, port scanning, and scan scheduling1, pages 149-160. It also discusses the common issues and challenges of vulnerability scanning, such as network disruptions, false positives, and scan scope1, pages 161-162. Therefore, this is a reliable source to verify the answer to the question.

Contribute your Thoughts:

An
5 months ago
A) Perform non-credentialed scans? I'd rather perform an interpretive dance routine for the printers. C) is the clear winner here, just like my cat winning the annual 'Best Hairball' competition.
upvoted 0 times
Joana
4 months ago
Create a tailored scan for the printer subnet.
upvoted 0 times
...
Mari
5 months ago
Perform non-credentialed scans.
upvoted 0 times
...
...
Ryan
5 months ago
I don't think non-credentialed scans would be as effective as creating a tailored scan for the printer subnet. It's important to focus on the specific area causing the issue.
upvoted 0 times
...
Dwight
5 months ago
But wouldn't performing non-credentialed scans also help in avoiding the problem?
upvoted 0 times
...
Elza
5 months ago
I agree with Cornell, that sounds like the best solution to prevent the issue.
upvoted 0 times
...
Earleen
5 months ago
B) Ignore embedded web server ports? Are you kidding me? That's like treating a paper cut with a chainsaw. C) is the way to go, hands down.
upvoted 0 times
Tu
4 months ago
C) Create a tailored scan for the printer subnet.
upvoted 0 times
...
Bernadine
4 months ago
A) Perform non-credentialed scans.
upvoted 0 times
...
...
Cornell
5 months ago
I think we should create a tailored scan for the printer subnet.
upvoted 0 times
...
Jutta
6 months ago
I'm going with D) Increase the threshold length of the scan timeout. Maybe the printers just need a little more time to process all that juicy vulnerability data.
upvoted 0 times
Aaron
5 months ago
I agree, D) Increase the threshold length of the scan timeout might just be delaying the issue.
upvoted 0 times
...
Troy
5 months ago
I think C) Create a tailored scan for the printer subnet would be more effective.
upvoted 0 times
...
...
Lanie
6 months ago
C) Create a tailored scan for the printer subnet. Duh, it's obvious that the printers are getting affected. Why even bother with the other options?
upvoted 0 times
Lili
5 months ago
Create a tailored scan for the printer subnet.
upvoted 0 times
...
Vannessa
5 months ago
Ignore embedded web server ports.
upvoted 0 times
...
Tricia
6 months ago
Perform non-credentialed scans.
upvoted 0 times
...
...

Save Cancel