exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 84 discussion

Actual exam question from CompTIA's PT0-002
Question #: 84
Topic #: 1
[All PT0-002 Questions]

A Chief Information Security Officer wants a penetration tester to evaluate whether a recently installed firewall is protecting a subnetwork on which many decades- old legacy systems are connected. The penetration tester decides to run an OS discovery and a full port scan to identify all the systems and any potential vulnerability. Which of the following should the penetration tester consider BEFORE running a scan?

  • A. The timing of the scan
  • B. The bandwidth limitations
  • C. The inventory of assets and versions
  • D. The type of scan
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Lee_Lah
Highly Voted 2 years, 2 months ago
B. Bandwidth limitations as this could affect the legacy equipment that will be scanned.
upvoted 14 times
...
RightAsTain
Highly Voted 2 years, 3 months ago
D. Testing a firewall to see what ports are open not penetrating the firewall. Use ack or fin scan.
upvoted 9 times
deeden
10 months ago
Agreed. The CISO wants to check whether the Firewall is doing its job.
upvoted 1 times
...
...
Vslaugh
Most Recent 1 day, 9 hours ago
Selected Answer: D
The inventory of assets is helpful, but the type of scan is what directly impacts the safety of legacy systems during a penetration test. You must choose a non-intrusive scan type to prevent crashes or disruptions. CompTIA exams prioritize minimizing disruption in sensitive environments. Therefore, D. The type of scan directly addresses the need to protect legacy systems from harm during testing.
upvoted 1 times
...
zemijan
2 months, 1 week ago
C. Knowing the inventory helps the tester avoid direct interactions with legacy systems, thereby protecting them from unnecessary risk. Although bandwidth is a legitimate concern, having a proper inventory provides a more strategic solution by enabling selective testing and avoiding high-risk systems altogether.
upvoted 2 times
...
Hedwig74
9 months, 2 weeks ago
This is a hard one, as all of these need consideration. Timing is essential in any scan, not any more or less important on legacy systems. Bandwidth is the same. If you're just scanning, and you are, then they should be able to support a scan. The type of scan is important, particularly if you're trying to get into the legacy systems to retrieve info (i.e. SNMP vs SSH or in the clear vs encrypted, blah, blah....). The inventory, though, may be the most important. Inventory is the MOST important though, because it says assets and versions. Remember, the CISO wants to test the security of the new firewall, not the vulnerability of the legacy systems. So, with a proper inventory (to include IP's), you could exclude those IP addresses and test the firewall without affecting the legacy systems at all.
upvoted 1 times
...
LiveLaughToasterBath
11 months, 1 week ago
You'd be surprised how many people still run on 4x1 or less.
upvoted 1 times
...
WANDOOCHOCO
11 months, 3 weeks ago
Selected Answer: B
The keyword here is "decades-old legacy systems"
upvoted 1 times
...
b0ad9e1
1 year ago
Selected Answer: B
" a subnetwork on which many decades- old legacy systems are connected. " Sometimes CompTIA is generous is giving us a big fat clue as to what the answer is. They said "many decades old" I am old enough to remember when 10mb Ethernet was a lot of bandwidth. Again, "decades old". Answer is B bandwidth limitations.
upvoted 3 times
...
lordguck
1 year, 1 month ago
A: Possible B: Unlikely as even old systems with let's say 10mbit Lan should be able to weather a port scan C: The description say we want to discover so using the inventory is an unlikely solution D. The type of scan: The type of scan (e.g., aggressive, stealth, non-intrusive) can significantly impact network systems. Aggressive scans are more thorough but can be more disruptive, especially to older systems. Non-intrusive scans are less likely to cause disruptions but might not provide as detailed information. Choosing the right type of scan for the environment is crucial.
upvoted 3 times
...
Noragretz
1 year, 3 months ago
inventory, then consider they type of scan that is safe to use on the legacy system
upvoted 1 times
...
4vv
1 year, 5 months ago
Selected Answer: C
The most crucial to the penetration tester would be the inventory of assets and versions so they don't break the system (worse than breaking the business for a LIMITED time)
upvoted 1 times
...
solutionz
1 year, 5 months ago
Selected Answer: B
When dealing with older legacy systems, there are specific concerns that a penetration tester must take into account before running a scan. Legacy systems might not be as robust as modern systems, and they could be more sensitive to certain types of scans. Among the given options, B. The bandwidth limitations is a critical consideration. Many older systems may not handle high levels of network traffic very well, and a full port scan or OS discovery can generate a significant amount of traffic. This could potentially lead to issues such as network slowdowns or even crashes of the legacy systems. So, the penetration tester should understand the bandwidth limitations and carefully plan the scan to ensure that it doesn't inadvertently cause problems with the systems they are trying to evaluate. This consideration helps ensure that the test doesn't disrupt normal operations or damage the systems themselves.
upvoted 3 times
...
tekgeek
1 year, 5 months ago
Selected Answer: C
The correct answer is C. The inventory of assets and versions. Before running a scan, the penetration tester should consider the inventory of assets and versions of the systems on the subnetwork. Legacy systems can have different vulnerabilities and security issues compared to modern systems. Understanding the inventory of assets will help the tester focus on identifying potential risks specific to the legacy systems. While the other options (A, B, and D) are important considerations in penetration testing, they are not directly related to evaluating legacy systems' security.
upvoted 1 times
...
cloudgangster
1 year, 6 months ago
Selected Answer: C
C. The inventory of assets and versions. Understanding the inventory of assets and their associated versions is crucial before conducting a scan. This information helps the penetration tester identify the legacy systems and their specific characteristics, including potential vulnerabilities that may be present in outdated or unsupported software or hardware. By having a clear inventory, the penetration tester can tailor the scan to focus on the specific systems and versions present in the subnetwork, ensuring a more targeted and accurate assessment.
upvoted 1 times
...
konanna
1 year, 8 months ago
Selected Answer: C
cccccccccccccccc
upvoted 1 times
...
Ybc01
1 year, 8 months ago
It's not C or D. "The penetration tester decides to run an OS discovery and a full port scan to identify all the systems and any potential vulnerability." This sentence covers both C and D. Run an os discovery and full port scan = D. Considering that these are legacy systems and the pentester is already planning to scan "All" the systems, C doesn't make much sense to me. A makes the most sense because the old systems could be easily disrupted by the scans, which the client wouldn't want to happen during production hours.
upvoted 1 times
...
TCSNxS
1 year, 9 months ago
D makes the most sense. The question is pretty specific about running a scan to gather OS and inventory info, so I'm assuming they don't have the assets yet. But you are likely trying to get past a FW. The type of scan is going to be critical.
upvoted 2 times
KingIT_ENG
1 year, 9 months ago
More sense C answer
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago