Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM Exam C1000-140 Topic 12 Question 33 Discussion

Actual exam question for IBM's C1000-140 exam
Question #: 33
Topic #: 12
[All C1000-140 Questions]

Consider this scenario and instruction.

Vulnerability assessment products launch attacks that can result in offense creation. To avoid this behavior and define vulnerability assessment products or any server that you want to ignore as a source, edit the ''and when the source IP is one of the following'' test to include the IP addresses of the following scanners.

VA Scanners

Authorized Scanners

What type of editable building block is described?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Kallie
3 months ago
Knock, knock. Who's there? The VA scanner. The VA scanner who? The VA scanner who's about to find 99 vulnerabilities on your system.
upvoted 0 times
Emile
1 months ago
D) BB:HostDefinition: Proxy Servers
upvoted 0 times
...
Evelynn
1 months ago
C) BB:NetworkDefinition: Server Networks
upvoted 0 times
...
Jacob
2 months ago
B) BB:HostDefinition: VA Scanner Source IP
upvoted 0 times
...
Lauran
2 months ago
A) BB:HostDefinition: Authorized ScannersSource IP
upvoted 0 times
...
...
Merri
3 months ago
Well, if I can't hack the network, I might as well become a professional vulnerability assessor. B it is!
upvoted 0 times
Nieves
2 months ago
User 3: I think B is the best choice too. Let's select that.
upvoted 0 times
...
Kent
2 months ago
User 2: Yeah, that option makes sense. Let's go with B.
upvoted 0 times
...
Kallie
2 months ago
User 1: I agree, B) BB:HostDefinition: VA Scanner Source IP is the correct choice.
upvoted 0 times
...
...
Claudia
3 months ago
This is a tricky one, but I'm going to go with B. Who needs to hack the network when you can just scan it to death?
upvoted 0 times
Carlton
2 months ago
Definitely, it's better to be prepared and have them on the radar.
upvoted 0 times
...
Lyndia
2 months ago
I agree, VA scanners can be quite aggressive. It's important to have them defined.
upvoted 0 times
...
Gerri
2 months ago
I think B is the correct answer. VA scanners can be a real pain.
upvoted 0 times
...
...
Buck
4 months ago
Ah, a classic 'what is the building block' type of question. I'm going with B as well, since it's the only option that directly mentions VA scanners.
upvoted 0 times
Dorothy
2 months ago
Great, we're all on the same page then. B) it is.
upvoted 0 times
...
Lawanda
2 months ago
I agree, B) is the most relevant option in this scenario.
upvoted 0 times
...
Delsie
3 months ago
Yeah, that makes sense. It specifically mentions VA scanners.
upvoted 0 times
...
Graham
3 months ago
I think the answer is B) BB:HostDefinition: VA Scanner Source IP
upvoted 0 times
...
...
Glenn
4 months ago
Hmm, this looks like a question about network security and vulnerability assessment tools. I think the correct answer is B, since it specifically mentions editing the 'and when the source IP is one of the following' test to include the IP addresses of the VA scanners.
upvoted 0 times
...
Christoper
4 months ago
I'm not sure, but I think C) BB:NetworkDefinition: Server Networks could also be a possible answer.
upvoted 0 times
...
Malcom
4 months ago
I agree with Fernanda, because VA scanners are specifically mentioned in the scenario.
upvoted 0 times
...
Fernanda
4 months ago
I think the answer is B) BB:HostDefinition: VA Scanner Source IP.
upvoted 0 times
...

Save Cancel