Topic: CS0-003 topic 1 question 38

A company that has a geographically diverse workforce and dynamic IPs wants to implement a vulnerability scanning method with reduced network traffic. Which of the following would best meet this requirement?

A.
External
B.
Agent-based
C.
Non-credentialed
D.
Credentialed

Re: CS0-003 topic 1 question 38

The answer is in the question asked "dynamic IPs"

Re: CS0-003 topic 1 question 38

B. Agent-based
Think of how Dyn-DNS did it in the old days and still do it today! Because diverse and dynamic IPs cannot be static, they use an agent based solution to keep Dyn-DNS synced, but that is older technology. Other agent based solutions these days are like End Point Security agents.

Re: CS0-003 topic 1 question 38

"The advantages of agent-based scanning are to reduce the impact on the network and reduce the chances of causing service outages. Another advantage is that server-based scans might not have the opportunity to assess devices that connect to the network temporarily and infrequently, such as mobiles and laptops. One drawback is that the range of agents may be limited to a particular operating system. There is also the chance that an adversary could compromise the agent software. It is often right to use both approaches to cover different asset classes. For example, agent-based scanning might be used for client PCs and mobiles, while active server-based scanning is used for network servers and routing/switching infrastructure, and passive scanning is used for embedded systems networks."  (The Official CompTIA CySA+ Student Guide Exam CS0-002 page 354)

Re: CS0-003 topic 1 question 38

I agree!

Re: CS0-003 topic 1 question 38

For a company with a geographically diverse workforce and dynamic IP addresses looking to implement a vulnerability scanning method with reduced network traffic, the most suitable option is:

B. Agent-based

Agent-based vulnerability scanning involves deploying scanning agents on the target systems. These agents perform the scanning locally on each system, reducing the need for extensive network traffic because the scanning is distributed. This approach is particularly well-suited for environments with dynamic IP addresses and remote workers because it doesn't rely on centralized scanning servers or frequent network scans