exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 15 discussion

Actual exam question from CompTIA's PT0-002
Question #: 15
Topic #: 1
[All PT0-002 Questions]

A penetration tester is scanning a corporate lab network for potentially vulnerable services.
Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?

  • A. nmap 192.168.1.1-5 -PU22-25,80
  • B. nmap 192.168.1.1-5 -PA22-25,80
  • C. nmap 192.168.1.1-5 -PS22-25,80
  • D. nmap 192.168.1.1-5 -Ss22-25,80
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
The_F00L
Highly Voted 1 year, 11 months ago
Selected Answer: C
D is the only answer that doesnt actually RUN so I dont see why that's the majority answer. Looking at nmap --help clearly shows: -PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports We want TCP, so -PS will do the job. So I have to say C.
upvoted 14 times
rodwave
7 months, 1 week ago
This is right, the command for D doesn't work so it wouldn't run. C is the best option here.
upvoted 1 times
...
...
RRabbit_111
Highly Voted 1 year, 11 months ago
Selected Answer: D
The correct answer is D. nmap 192.168.1.1-5 -Ss22-25,80. This command will perform a SYN scan of ports 22 through 25 and port 80 on the IP addresses 192.168.1.1 through 192.168.1.5. This scan will return any potentially vulnerable ports that might be of interest to an attacker. The capital 'S' stands for the SYN flag, which is used to initiate a connection on a TCP port. The lowercase 's' stands for the stealth flag, which is used to hide the source IP address of the scan and make it harder to detect.
upvoted 6 times
KeToopStudy
1 year ago
The problem with that is the stealth scan flag is -sS not -Ss... It is not a valid flag the answer D
upvoted 5 times
...
...
Learner213
Most Recent 1 week, 6 days ago
Selected Answer: C
-PS is the best switch for Host Discovery which is what this question requires. -PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
upvoted 1 times
...
zemijan
2 months, 2 weeks ago
The command provided in Option D, nmap 192.168.1.1-5 -Ss22-25,80, is not valid and would indeed not run as expected. The correct syntax should be: Copy code nmap 192.168.1.1-5 -sS 22-25,80 The lowercase -sS specifies a TCP SYN scan, while the uppercase -Ss would be incorrect. --------- The next best option would be: C. nmap 192.168.1.1-5 -PS22-25,80
upvoted 1 times
...
Etc_Shadow28000
3 months, 2 weeks ago
Selected Answer: C
C. `nmap 192.168.1.1-5 -PS22-25,80` Explanation: - The `-PS` option performs a TCP SYN ping scan, which sends SYN packets to the specified ports (22-25,80) on the target hosts (192.168.1.1-5) to check if those ports are open. - While this does not perform a full vulnerability scan, it is useful for identifying live hosts with open ports, which can be the first step in identifying potentially vulnerable services. The other options (`-PU` for UDP ping and `-PA` for ACK ping) are less likely to be useful for identifying open ports and potentially vulnerable services in this context. If the -sS option (note the correct lowercase -sS instead of -Ss) is a SYN scan, which is the most effective and common way to scan for open ports. This type of scan sends SYN packets to the specified ports and determines if they are open based on the responses, making it useful for identifying potentially vulnerable services.
upvoted 3 times
...
Paula77
6 months, 3 weeks ago
Selected Answer: D
The -Ss scan will provide information about open ports, which is essential for assessing potential risks.
upvoted 1 times
fecffa8
1 month, 4 weeks ago
-Ss isn't valid. It would be -sS
upvoted 1 times
...
...
aa9ee6c
7 months, 1 week ago
C is definitely the correct answer
upvoted 1 times
...
Kirby87
1 year, 1 month ago
The correct answer to the question is option B: nmap 192.168.1.1-5 "PA22-25,80". The "PA" option specifies a port scan and identifies services based on their response to specific probes. This scan will return open ports 22-25 and 80, and attempt to identify potential vulnerabilities in those services.
upvoted 2 times
...
solutionz
1 year, 5 months ago
Selected Answer: D
Nmap is a widely used tool for network discovery and security auditing. Different options can be used to perform various types of scans. In the given context, you would likely want to use a stealthy SYN scan to identify open ports that might be running vulnerable services. The SYN scan is a popular method that's useful in port scanning as it doesn't complete the TCP handshake and is therefore considered "stealthier." The correct option for performing a SYN scan over the specified range of IPs and ports would be: D. `nmap 192.168.1.1-5 -sS 22-25,80` Note the correct flag for a SYN scan is `-sS`, not `-Ss`. Therefore, it appears there may be a typographical error in the options provided, and based on the context, option D should be the correct choice if corrected to `-sS`.
upvoted 1 times
...
nooooo
1 year, 6 months ago
Selected Answer: D
The -sS option tells the nmap command to perform a TCP SYN scan, which is a stealthy way to scan a network. The 22-25,80 option tells the nmap command to scan the specified ports, which are commonly used by vulnerable services. Option C, nmap 192.168.1.1-5 -PS22-25,80, will return all open ports that are listening for proxy services, which are not typically vulnerable.
upvoted 1 times
...
MysterClyde
1 year, 7 months ago
C is correct. Ss is invalid syntax. But if it were sS, then the answer would be D for sure.
upvoted 2 times
...
POWNED
1 year, 8 months ago
Selected Answer: C
D is incorrect for an obvious reason running -Ss would result in an error, it would be the correct answer if it were -sS
upvoted 3 times
...
KingIT_ENG
1 year, 10 months ago
C is correct answer
upvoted 1 times
...
kenechi
1 year, 10 months ago
Selected Answer: C
The Ports 22,25,80 are all tcp ports. A syn scan (-sS) would have done the job but since it is not listed, the -PS flag would also do a tcp syn scan.
upvoted 4 times
...
dcyberguy
2 years, 2 months ago
The only issue is have is that it is write as -Ss instead of -sS
upvoted 1 times
Vikt0r
1 year, 11 months ago
I think it's a typo.
upvoted 1 times
...
Ahegi
1 year, 9 months ago
this has to be a typo. all -P* are host discovery scans. This will not identify vulnerable ports.
upvoted 1 times
BirdLawyer
7 months, 2 weeks ago
They do a host discovery first and then they scan the ports, so sS and PS are essentially the same thing and they both send TCP Syn packets, except PS does a host discovery beforehand
upvoted 1 times
...
...
...
petercorn
2 years, 2 months ago
Selected Answer: C
There is no -Ss switch unless is -sS.
upvoted 4 times
...
Neolot
2 years, 3 months ago
Selected Answer: C
https://www.examtopics.com/discussions/comptia/view/66643-exam-pt1-002-topic-1-question-42-discussion/
upvoted 4 times
Manzer
2 years, 3 months ago
Looks like both according to this post. https://www.linuxquestions.org/questions/linux-newbie-8/difference-beween-nmap-ps-and-ss-4175534781/
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago