New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Cybersecurity-Audit-Certificate Exam - Topic 1 Question 7 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 7
Topic #: 1
[All Cybersecurity-Audit-Certificate Questions]

he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:

Show Suggested Answer Hide Answer
Suggested Answer: D

The MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization is using avirtual local area network (VLAN). A VLAN is a logical grouping of network devices that share the same broadcast domain regardless of their physical location or connection. A VLAN can enhance network security by isolating different types of traffic or users from each other and applying different security policies or rules based on the VLAN membership. For example, an organization can create a VLAN for HR desktops and internal laptop users that restricts their access to only HR-related systems or resources. A VLAN can also reduce network costs by saving bandwidth, improving performance, and simplifying management.


Contribute your Thoughts:

0/2000 characters
Yoko
3 months ago
Common vulnerabilities are the main focus, though.
upvoted 0 times
...
Amina
3 months ago
I think they can detect some unknowns too, right?
upvoted 0 times
...
Dean
3 months ago
Wait, are you saying they can't catch zero-days?
upvoted 0 times
...
Gabriele
4 months ago
Totally agree, that's a big limitation!
upvoted 0 times
...
Avery
4 months ago
They only find known vulnerabilities.
upvoted 0 times
...
Portia
4 months ago
I'm a bit confused; I thought scanners could also detect some common vulnerabilities, but maybe that's not the main limitation?
upvoted 0 times
...
Taryn
4 months ago
I feel like the answer is C, known vulnerabilities, since that's what scanners are designed to detect most effectively.
upvoted 0 times
...
Fatima
4 months ago
I think I saw a practice question that mentioned zero-day vulnerabilities being a major concern, but I'm not sure if that's what this question is asking.
upvoted 0 times
...
Chana
5 months ago
I remember reading that scanners are really good at finding known vulnerabilities, but they struggle with the unknown ones.
upvoted 0 times
...
Amber
5 months ago
I feel pretty confident about this one. Vulnerability scanners are great for finding the low-hanging fruit, but they can't uncover the more advanced, unknown vulnerabilities that could be lurking in the system. I'm going to select option B.
upvoted 0 times
...
Maryrose
5 months ago
Hmm, I'm a bit confused on this one. I know vulnerability scanners have limitations, but I'm not sure if the most significant one is that they only detect known vulnerabilities. Let me think this through a bit more.
upvoted 0 times
...
Tonja
5 months ago
I'm pretty sure the answer is C - known vulnerabilities. Vulnerability scanners are designed to detect common, well-known vulnerabilities, but they can't find zero-day or unknown vulnerabilities.
upvoted 0 times
...
Paola
5 months ago
Okay, I think I've got it. The key here is that modern scanners are limited to detecting common, well-known vulnerabilities. They can't find the really tricky, zero-day vulnerabilities that hackers might be using. So I'm going to go with option D.
upvoted 0 times
...
Roslyn
5 months ago
Ah, I see what they're getting at. Confidential Transactions use cryptographic techniques to conceal the amounts, but they still have to prove the transaction is valid by showing the inputs and outputs match up. So the answer has to be True.
upvoted 0 times
...
Deane
5 months ago
This is a tricky one. I'm not super familiar with Splunk's syslog handling, so I'll need to review the material and think through the different approaches. Reliability is key, so I'll focus on understanding which options are most likely to ensure consistent data delivery.
upvoted 0 times
...
Kris
5 months ago
This question seems straightforward. I think segregating the application and database servers into different virtual networks is the way to go.
upvoted 0 times
...
Jesusita
10 months ago
Haha, imagine a vulnerability scanner that could detect 'unknown' vulnerabilities. That would be like a mind-reading cybersecurity tool. Sign me up for that one!
upvoted 0 times
Azzie
8 months ago
D) zero-day vulnerabilities.
upvoted 0 times
...
Brett
8 months ago
C) known vulnerabilities.
upvoted 0 times
...
Ben
9 months ago
A) common vulnerabilities.
upvoted 0 times
...
...
Lawrence
10 months ago
I'm pretty sure the scanners can't detect zero-day vulnerabilities. That's the whole point of a zero-day - it's something no one knows about yet. Scanners are useful, but they're not psychic.
upvoted 0 times
Gene
8 months ago
C: Zero-day vulnerabilities are definitely out of their reach.
upvoted 0 times
...
Millie
9 months ago
B: I think they're limited to common vulnerabilities.
upvoted 0 times
...
Lavelle
9 months ago
A: Yeah, scanners can only detect known vulnerabilities.
upvoted 0 times
...
...
Soledad
10 months ago
C is the correct answer. Vulnerability scanners are great, but they're only as good as the database of known vulnerabilities they have access to. Anything new or unknown will slip through the cracks.
upvoted 0 times
Colene
9 months ago
Definitely. It's a constant battle to stay ahead of potential threats.
upvoted 0 times
...
Deandrea
9 months ago
I agree. It's scary to think about the unknown vulnerabilities that could be out there.
upvoted 0 times
...
Patti
10 months ago
That's true. It's important to keep updating the scanner's database to stay protected.
upvoted 0 times
...
An
10 months ago
C is the correct answer. Vulnerability scanners are great, but they're only as good as the database of known vulnerabilities they have access to.
upvoted 0 times
...
...
Kirby
11 months ago
I think the most significant limitation is that vulnerability scanners can only detect known vulnerabilities. There are always going to be unknown and zero-day vulnerabilities out there that they can't catch.
upvoted 0 times
Ciara
10 months ago
D) zero-day vulnerabilities.
upvoted 0 times
...
Ines
10 months ago
B) unknown vulnerabilities.
upvoted 0 times
...
Annice
10 months ago
C) known vulnerabilities.
upvoted 0 times
...
Samira
10 months ago
A) common vulnerabilities.
upvoted 0 times
...
...
Rory
11 months ago
But wouldn't detecting common vulnerabilities still be helpful in securing systems, even if it's not perfect?
upvoted 0 times
...
Lisandra
11 months ago
I agree with Truman, detecting only known vulnerabilities can leave systems vulnerable to zero-day exploits.
upvoted 0 times
...
Truman
11 months ago
I think the most significant limitation is that scanners only detect known vulnerabilities.
upvoted 0 times
...

Save Cancel