Validating Scanning Tools' Results: Best Method for Collecting Information | SY0-601 Exam Prep

Collecting Data to Prove and Validate Scanning Tools' Results

Prev Question Next Question

Question

A penetration testing is preparing for a client engagement in which the tester must provide data that proves and validates the scanning tools' results.

Which of the following is the best method for collecting this information?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

The best method for collecting data that proves and validates the scanning tools' results would be to configure network flow data logging on all scanning systems.

Network flow data logging involves the collection of information about the network traffic passing through a network device or system. This information includes details about the source and destination of the traffic, the type of traffic, and the amount of data transferred.

By configuring network flow data logging on the scanning systems, the penetration tester can capture detailed information about the scanning tools' activities and their impact on the network. This data can then be used to validate the results produced by the scanning tools and to identify any issues or anomalies that may have been missed by the tools themselves.

The other options provided are not as effective as configuring network flow data logging. Setting up the scanning system's firewall to permit and log all outbound connections would only capture information about the connections made by the scanning system itself, rather than the traffic passing through it. Using a protocol analyzer to log all pertinent network traffic may capture useful data, but it would require significant time and effort to manually sift through the captured data and identify relevant information. Enabling debug level logging on the scanning system and all scanning tools used may produce a large amount of log data, but it may not provide the level of detail required to validate the scanning tools' results.

Therefore, the best method for collecting information that proves and validates the scanning tools' results is to configure network flow data logging on all scanning systems.