ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 44 - 312-38 discussion

Report
Export

FILL BLANK

Fill in the blank with the appropriate term. ______________________ is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed.

A.
Network reconnaissance
Answers
A.
Network reconnaissance
Suggested answer: A

Explanation:

Network reconnaissance is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed. Network reconnaissance is increasingly used to exploit network standards and automated communication methods. The aim is to determine what types of computers are present, along with additional information about those computers such as the type and version of the operating system. This information can be analyzed for known or recently discovered vulnerabilities that can be exploited to gain access to secure networks and computers. Network reconnaissance is possibly one of the most common applications of passive data analysis. Early generation techniques, such as TCP/IP passive fingerprinting, have accuracy issues that tended to make it ineffective. Today, numerous tools exist to make reconnaissance easier and more effective.

asked 18/09/2024
Luyanda Hatta
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first