exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 132 discussion

Actual exam question from CompTIA's SY0-501
Question #: 132
Topic #: 1
[All SY0-501 Questions]

A black hat hacker is enumerating a network and wants to remain covert during the process. The hacker initiates a vulnerability scan. Given the task at hand the requirement of being covert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?

  • A. The vulnerability scanner is performing an authenticated scan.
  • B. The vulnerability scanner is performing local file integrity checks.
  • C. The vulnerability scanner is performing in network sniffer mode.
  • D. The vulnerability scanner is performing banner grabbing.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
DigitalJunkie
Highly Voted 5 years, 4 months ago
Also, network enumeration means information gathering. A sniffer is used to gather information.
upvoted 13 times
...
DigitalJunkie
Highly Voted 5 years, 4 months ago
In sniffer mode it is only analyzing the traffic of data, observing not penetrating. Banner grabbing can be detected by an IDS or IPS. It clearly states he wants to stay covert.
upvoted 6 times
...
fonka
Most Recent 3 years, 6 months ago
Two answers both seems similar which is banner gtaber and packet sniffer. The correction answer is C network sniffer because the key word in the first line says the objective is to get packets in networking with out being visible. Banner graber can also be used as passive mode but the objective is not to get what publicly available information (banner info)/ instead it is to sniff(listen) packets without being seen by others. Moreover banner graber inclined to active reconnaissance
upvoted 2 times
...
Basem
5 years, 4 months ago
Why not banner grabbing ?
upvoted 1 times
Jenkins3mol
5 years, 3 months ago
banner grabbing will jot down the communication in log, even including banner grabbing.
upvoted 1 times
...
vaxakaw829
4 years, 4 months ago
With active reconnaissance, on the other hand, the pentester employs a broader range of tools, such as network mapping, port scanning, and more. Active reconnaissance puts the pentester at greater risk of discovery, but needs to happen as part of the testing process. (See “Banner Grabbing” later in this module for a good example of active reconnaissance techniques.) (Mike Meyer’s CompTIA Security+ p. 496)
upvoted 2 times
...
...
mad
5 years, 6 months ago
convert? should be covert
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago