Certified Ethical Hacker (CEH) Practice Question

While performing an internal vulnerability assessment, you first execute a non-credentialed OpenVAS scan against a group of CentOS servers, then repeat the scan using valid SSH credentials. The initial run reports several missing kernel patches, but the credentialed scan lists none of them. Which statement best explains this discrepancy?

  • The non-credentialed scan's use of TCP connect probes inherently overestimates patch requirements on Unix systems, inflating the results.

  • A failed SSH key-exchange during the second scan caused the scanner to discard all vulnerability data for the targets, explaining the empty report.

  • The credentialed scan suppresses kernel-level findings by default to avoid destabilizing production servers.

  • The credentialed scan logs in via SSH and queries the system's package database, so it can confirm installed kernel versions and eliminate banner-based false positives.

Certified Ethical Hacker (CEH)
System Hacking Phases and Attack Techniques
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot