ExamGecko
Question list
Search
Search

Related questions











Question 257 - 200-201 discussion

Report
Export

Refer to the exhibit.

An attacker scanned the server using Nmap. What did the attacker obtain from this scan?

A.

Identified a firewall device preventing the pert state from being returned.

Answers
A.

Identified a firewall device preventing the pert state from being returned.

B.

Identified open SMB ports on the server

Answers
B.

Identified open SMB ports on the server

C.

Gathered information on processes running on the server

Answers
C.

Gathered information on processes running on the server

D.

Gathered a list of Active Directory users

Answers
D.

Gathered a list of Active Directory users

Suggested answer: B

Explanation:

The Nmap scan results show that several ports, including ftp (21/tcp), ssh (22/tcp), telnet (23/tcp), smtp (25/tcp), and http (80/tcp), are listed as ''filtered''. This typically indicates that a firewall is filtering the traffic to these ports, making it impossible to determine whether they are open without further investigation. However, the question specifically asks about SMB ports, which are not shown in the provided Nmap scan results. Therefore, based on the information given, we cannot confirm that the attacker identified open SMB ports on the server. The correct answer would require additional evidence not present in the scan results.Reference:= Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course materials and official Cisco documentation provide insights into interpreting Nmap scan results and identifying port states.These resources can be found at the Cisco Learning Network Store and Cisco's official training and certifications webpage

asked 07/10/2024
Jorge Correa
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first