DRAG DROP - Drag and drop the phases to evaluate the security posture of an asset from the left onto the activity that happens during the phases on the right. Select and Place:
The selected answers are drastically WRONG.
Reconnaissance -- gather info
Enumeration -- probing the target
Vulnerability Assessment -- confirming the existence of known vulnerabilities
Persistence -- inserting backdoor access or covert channels
Cover Tracks -- erasing traces
Exploit -- using previously identified vulnerabilities
Persistence is basically trying to make sure the target system is accessible by the attacker so the attacker makes sure they have long-term access to the target.
The following matches the phases to the activities:
Reconnaissance: Gathering information on a target for future use.
Enumeration: Probing the target to discover operating system details.
Vulnerability Assessment: Confirming the existence of non-vulnerabilities in the target system.
Exploit: Using previously identified vulnerabilities to gain access to the target system.
Persistence: Inserting backdoor access or covert channels to ensure access to the target system.
Cover Tracks: Erasing traces of actions in audit logs and registry entries. (verified through ChatGPT)
Reconnaissance
Enumeration
Vulnerability Assessment
Exploit
Persistence
Cover Tracks
(having just taken the test I can tell you less than 5 of these 149 questions were on the test in 1/23 ! )
I think the answer is wrong.
For me it should be:
Vulnerability assessment - Confirming the existence of known vulnerabilities in the target system
Persistence - Inserting backdoor access or covert channels to ensure access to target system
Exploit - Using previously identified vulnerabilities to gain access to the target system
Cover tracks - Erasing traces of actions in audit logs and registry entries
Reconnaissance - Probing the target to discover operating system details
Enumeration - Gathering information on a target for future use
I think you have the las two wrong. Recon gathers info from many sources not only probing the target. Enumeration focuses on probing the taget. it should be:
Vulnerability assessment - Confirming the existence of known vulnerabilities in the target system
Persistence - Inserting backdoor access or covert channels to ensure access to target system
Exploit - Using previously identified vulnerabilities to gain access to the target system
Cover tracks - Erasing traces of actions in audit logs and registry entries
*Reconnaissance - Gathering information on a target for future use
*Enumeration - Probing the target to discover operating system details
This section is not available anymore. Please use the main Exam Page.350-201 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ShammaA
1 year, 10 months agoDrVoIP
2 years, 1 month agoMDIAP
2 years, 1 month agojay_c_an
2 years, 1 month agoDrVoIP
2 years, 2 months agoDrVoIP
2 years, 2 months agonin16
2 years, 2 months agokyle942
2 years, 7 months agoKeannan
3 years, 5 months agoCiscoTester
3 years, 5 months agogreeklover84
10 months, 2 weeks agoTOLU1985
2 years, 7 months ago