ExamGecko
Question list
Search
Search

Question 20 - ICS-SCADA Cyber Security discussion

Report
Export

Which of the following steps is used to reveal the IP addressing?

A.
Footprinting
Answers
A.
Footprinting
B.
Surveillance
Answers
B.
Surveillance
C.
Cover your tracks
Answers
C.
Cover your tracks
D.
Enumeration
Answers
D.
Enumeration
Suggested answer: D

Explanation:

Enumeration is a step in the information-gathering phase of a penetration test or cyber attack where an attacker actively engages with the target to extract detailed information, including IP addressing.

Enumeration: During enumeration, the attacker interacts with network services to gather information such as user accounts, network shares, and IP addresses.

Techniques: Common techniques include using tools like Nmap, Netcat, and Nessus to scan for open ports, services, and to identify the IP addresses in use.

Purpose: The goal is to map the network's structure, find potential entry points, and understand the layout of the target environment.

Because enumeration involves discovering detailed information including IP addresses, it is the correct answer.

Reference

'Enumeration in Ethical Hacking,' GeeksforGeeks, Enumeration.

'Network Enumeration,' Wikipedia, Network Enumeration.

asked 18/09/2024
e m
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first