ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 392 - SK0-005 discussion

Report
Export

A server administrator has received tickets from users who report the system runs very slowly and various unrelated messages pop up when they try to access an internet-facing web application using default ports. The administrator performs a scan to check for open ports and reviews the following report:

Starting Nmap 7.70 https://nmap.org) at 2019-09-19 14:30 UTC

Nmap scan report for www.abc.com (172.45.6.85)

Host is up (0.0021s latency)

Other addresses for www.abc.com (not scanned) : 4503 : F7b0 : 4293: 703: : 3209

RDNS record for 172.45.6.85: 1ga45s12-in-f1.2d100.net

Port State Service

21/tcp filtered ftp

22/tcp filtered ssh

23/tcp filtered telnet

69/tcp open @username.com

80/tcp open http

110/tcp filtered pop

143/tcp filtered imap

443/tcp open https

1010/tcp open www.popup.com

3389/tcp filtered ms-abc-server

Which of the following actions should the server administrator perform on the server?

A.
Close ports 69 and 1010 and rerun the scan.
Answers
A.
Close ports 69 and 1010 and rerun the scan.
B.
Close ports 80 and 443 and rerun the scan.
Answers
B.
Close ports 80 and 443 and rerun the scan.
C.
Close port 3389 and rerun the scan.
Answers
C.
Close port 3389 and rerun the scan.
D.
Close all ports and rerun the scan.
Answers
D.
Close all ports and rerun the scan.
Suggested answer: A

Explanation:

Port 69 is used for TFTP (Trivial File Transfer Protocol), which is an insecure and unencrypted protocol for file transfer. Port 1010 is used for a malicious website that generates pop-up ads. Both of these ports are likely to be exploited by hackers or malware to compromise the server or the web application. The server administrator should close these ports and rerun the scan to verify that they are no longer open12.

References = 1: Why Are Some Network Ports Risky, And How Do You Secure Them? - How-To Geek(https://www.howtogeek.com/devops/why-are-some-ports-risky-and-how-do-you-secure-them/) 2: Switchport Port Security Explained With Examples - ComputerNetworkingNotes(https://www.computernetworkingnotes.com/ccna-study-guide/switchport-port-security-explained-with-examples.html)

asked 02/10/2024
Krzysztof Dyrdal
48 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first