exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 30 discussion

Actual exam question from CompTIA's CS0-003
Question #: 30
Topic #: 1
[All CS0-003 Questions]

Due to reports of unauthorized activity that was occurring on the internal network, an analyst is performing a network discovery. The analyst runs an Nmap scan against a corporate network to evaluate which devices were operating in the environment. Given the following output:

Which of the following choices should the analyst look at first?

  • A. wh4dc-748gy.lan (192.168.86.152)
  • B. officerckuplayer.lan (192.168.86.22)
  • C. imaging.lan (192.168.86.150)
  • D. xlaptop.lan (192.168.86.249)
  • E. p4wnp1_aloa.lan (192.168.86.56)
Show Suggested Answer Hide Answer
Suggested Answer: E 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Wole_excel
Highly Voted 7 months, 1 week ago
The analyst should first look at E. p4wnp1_aloa.lan (192.168.86.56). This device is particularly suspicious because it is running services commonly associated with unauthorized or malicious activity, including: SSH (port 22): Often used for remote administration, it can be used for unauthorized remote access. rpcbind (port 111): Typically associated with Remote Procedure Call (RPC) services, which could be a vector for attacks. netbios-ssn (port 139) and microsoft-ds (port 445): Both ports are related to SMB, which is often exploited in network attacks. http-alt (port 8000): This could be a web service running on a non-standard port, potentially for malicious purposes. The MAC address indicates the device is from the Raspberry Pi Foundation, suggesting it might be a Raspberry Pi, which is sometimes used as a platform for penetration testing or unauthorized network activities (e.g., using the P4wnP1 tool, which is a popular pentesting tool for Raspberry Pi). This combination of factors makes it the most suspicious device in the list.
upvoted 10 times
...
cartman_sc
Highly Voted 10 months, 1 week ago
Selected Answer: E
It would be this user for two reasons. One, they are using a raspberry.pi, and two, because p4wnp1_aloa is a framework focused on red teaming on raspberry devices, making them a suspect immediately.
upvoted 8 times
...
botla
Most Recent 4 days ago
Selected Answer: E
I think you would not base your decision on just a nmap scan. You should obviously know your network: Why is there a ROKU or a Raspberry system in your network? I would wonder why a Roku device is there, but hey, maybe they have a gaming room? For a corporate environment I would though wonder why there is a Raspberry present. These types of computers get used more and more in appliances and could have a reason to be there, but with all those ports open??? That would be negligence of the supplier.
upvoted 1 times
...
PatrickH
10 months, 2 weeks ago
Thats an awful lot to read, digest and evaluate in a timed exam! Im worried now :)
upvoted 3 times
...
captaintoadyo
10 months, 2 weeks ago
Selected Answer: E
P4wnP1_aloa looks suspicious because of the open ports
upvoted 2 times
...
dave_delete_me
10 months, 2 weeks ago
Yep, these ports are all suss
upvoted 1 times
...
Nishaw
11 months, 2 weeks ago
A. wh4dc-748gy.lan (192.168.86.152) The analyst should look at the device with the hostname "wh4dc-748gy.lan" (192.168.86.152) first. This is because the Nmap scan report shows that this device has several open ports, including common services such as HTTP, HTTPS, and Microsoft-DS (SMB), which are often targeted by attackers. Additionally, the report indicates that there are several filtered ports on this device, which could indicate potential security measures or firewall rules in place. Investigating this device further may help identify any unauthorized or suspicious activity occurring on the network.
upvoted 2 times
BAMMRM
8 months, 3 weeks ago
I like your reasoning, however, there is a more obvious answer. You can see that the MAC addresses correspond to Dell or Intel. However, one of them corresponds to a RasberryPi, which is a very very small computer often used for small attacks and pentestings. You need to investigate that one first as it is the MOST OBVIOUS and suspicious device. The answer is E...p4wnp1_aloa.lan
upvoted 2 times
...
...
deeden
1 year, 3 months ago
Selected Answer: E
I vote E because it's running rpcbind and http-alt in addition to the OS raspberry pi. Admin should take a look at A second.
upvoted 4 times
...
crackman123
1 year, 3 months ago
i choosed E because the nmap scan show Http Alt ( port 8000 ) open while the regular http port is closed
upvoted 1 times
...
chrys
1 year, 5 months ago
Agree. Besides the funky name, it's suspicious that a single machine is running both Linux endpoint mapper (TCP 111) and MS RPC (TCP 135). That is just NOT natural. The others are all arguably Microsoft machines. Don't mind the SSH (TCP 22) on one of them--could be an SSH server installed on the machine--unusual, but not impossible.
upvoted 3 times
...
dcdc1000
1 year, 5 months ago
Agree with answer E. Take a look at the MAC address -- (Raspberry PI).
upvoted 3 times
...
kmordalv
1 year, 6 months ago
Selected Answer: E
Correct The analyst should look at p4wnp1_aloa.lan (192.168.86.56) first, as this is the most suspicious device on the network. https://github.com/RoganDawes/P4wnP1_aloa
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago