Q: 2
[Information Gathering and Vulnerability Scanning]
A penetration tester is configuring a vulnerability management solution to perform credentialed
scans of an Active Directory server. Which of the following account types should the tester provide to
the scanner?
Options
Discussion
I thought A (read-only) since it's credentialed, and usually you want least privilege for scans. Not totally sure though.
B, is what you need for full credentialed scans on AD. Saw something similar in a practice test.
I think A works for most scans, since read-only should let the scanner pull config info without major risks. B seems like overkill and a big privilege escalation threat if creds leak. Anyone else see similar questions suggest A as a safer trap pick?
saw pretty similar problem in my exam. in practice sets, they wanted B since domain admin has the creds to pull all system and registry info needed for a real credentialed scan. Not 100 percent but feels like classic CompTIA logic. Agree?
If AD had LAPS enforced, wouldn't A work? A
Maybe B . Similar questions in practice tests say domain admin is needed for deep credentialed scans on AD servers.
Why not just use A here? Isn't B a privilege escalation risk for the scan?
A or B? I went A because scanners usually just need to read config info, but maybe that's not enough for AD. Am I missing something?
I get why most say B, but I went for A since a read-only account still lets the scanner authenticate and pull info without extra risk. Some scanners just need read access for basic checks. Maybe not full depth but seemed safer.
B imo. For a credentialed scan on an AD server, you really need domain admin creds so the scanner can hit all the services, reg keys, and configs. Lower rights like read-only or local user can't access everything needed for a full assessment. That's what most official practice tests say too. Could be overkill in real life but CompTIA loves max privileges here. Disagree?
Be respectful. No spam.