ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 61 - ECSS discussion

Report
Export

Bob, a professional hacker, targeted an organization to launch attacks. Bob gathered information such as network topology and a list of live hosts. Based on the collected information, he launched further attacks over the organization's network.

Identify the type of network attack Bob initiated on the target organization in the above scenario.

A.

Session hijacking

Answers
A.

Session hijacking

B.

Buffer overflow

Answers
B.

Buffer overflow

C.

Data modification

Answers
C.

Data modification

D.

Enumeration

Answers
D.

Enumeration

Suggested answer: D

Explanation:

In the given scenario, Bob's actions align with the concept ofenumeration. Here's why:

Network Reconnaissance: Bob collected information about the organization's network topology and a list of live hosts. This initial step is part of network reconnaissance, where an attacker gathers details about the target system.

Enumeration: After collecting this information, Bob proceeded to launch further attacks. Enumeration involves actively probing a network to identify services, users, shares, and other system details. It helps attackers understand the target environment better.

Purpose of Enumeration: By identifying live hosts and understanding the network topology, Bob can tailor subsequent attacks more effectively. Enumeration provides crucial insights for attackers during the reconnaissance phase.

EC-Council Certified Security Specialist (E|CSS) course materials and study guide12.

asked 24/10/2024
Gaston Cruz
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first