exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 170 discussion

Actual exam question from CompTIA's PT0-002
Question #: 170
Topic #: 1
[All PT0-002 Questions]

An assessor wants to use Nmap to help map out a stateful firewall rule set. Which of the following scans will the assessor MOST likely run?

  • A. nmap -sA 192.168.0.1/24
  • B. nmap -sS 192.168.0.1/24
  • C. nmap -oG 192.168.0.1/24
  • D. nmap 192.168.0.1/24
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Random_Mane
Highly Voted 1 year, 10 months ago
Selected Answer: A
The ‐sA flag is used to conduct a TCP ACK scan and is most frequently used to test firewall rulesets.
upvoted 14 times
...
RRabbit_111
Highly Voted 1 year, 9 months ago
Selected Answer: B
B. nmap -sS 192.168.0.1/24 Explanation: -sS option is used to perform a SYN scan, which is a stealthy scan that is less likely to be detected by a firewall. By sending a SYN packet to a target and watching for a SYN-ACK or RST packet in response, the assessor can determine whether a port is open or closed. As a stateful firewall will keep track of the connection by inspecting the SYN-ACK packet and either allowing or denying the connection, the assessor can infer the firewall rule set from the scan results. Option A is a TCP ACK scan, which can be used to determine whether a firewall is in place or not, but it won't map the firewall rule set. Option C is a grepable output format, it doesn't specify any type of scan. Option D is a basic command which doesn't specify any type of scan, it will perform a default ping scan.
upvoted 11 times
kenechi
1 year, 7 months ago
A is the answer. https://nmap.org/book/scan-methods-ack-scan.html
upvoted 3 times
[Removed]
1 year, 7 months ago
A answer i a TCP ACK scan, which can be used to determine whether a firewall is in place or not, but it won't map the firewall rule set.
upvoted 2 times
...
[Removed]
1 year, 7 months ago
B is correct
upvoted 2 times
...
...
beamage
1 year, 8 months ago
why are you trying to be stealth?
upvoted 1 times
[Removed]
1 year, 7 months ago
Incorrect A answer B is the answer
upvoted 2 times
...
[Removed]
1 year, 7 months ago
B is the correct answer
upvoted 2 times
...
...
...
kinny4000
Most Recent 2 months, 3 weeks ago
Selected Answer: A
https://nmap.org/book/scan-methods-ack-scan.html ACK scan is used for firewall ruleset mapping.
upvoted 1 times
...
Hedwig74
6 months, 3 weeks ago
Cert master learn says that -sS is the default and most popular option, which is what the question is asking. Topic 8a: Evade detection: Flying under the radar.
upvoted 1 times
Hedwig74
6 months, 3 weeks ago
After some research, I agree with all those that selected A. -sA scan. It allows for testing for rulesets as opposed to just for firewalls in general. Sorry!
upvoted 2 times
...
...
surfuganda
7 months ago
Selected Answer: A
A. nmap -sA This is fundamental pentesting 101. GhatGPT is hot garbage. Go use some tools.
upvoted 2 times
...
WANDOOCHOCO
9 months ago
Selected Answer: A
Read the nmap man page
upvoted 2 times
...
Yokota
9 months ago
Selected Answer: A
The ACK scan is specifically useful for analyzing how a stateful firewall is configured in terms of how it treats packets that appear to be part of an existing connection.
upvoted 2 times
...
Selected Answer: A
From nmap: As described in depth in the section called “TCP ACK Scan (-sA)”, the ACK scan sends TCP packets with only the ACK bit set. Whether ports are open or closed, the target is required by RFC 793 to respond with a RST packet. Firewalls that block the probe, on the other hand, usually make no response or send back an ICMP destination unreachable error. This distinction allows Nmap to report whether the ACK packets are being filtered.
upvoted 1 times
...
Ahegi
1 year ago
Selected Answer: A
"ACK Scan As described in depth in the section called “TCP ACK Scan (-sA)”, the ACK scan sends TCP packets with only the ACK bit set. Whether ports are open or closed, the target is required by RFC 793 to respond with a RST packet. Firewalls that block the probe, on the other hand, usually make no response or send back an ICMP destination unreachable error. This distinction allows Nmap to report whether the ACK packets are being filtered." https://nmap.org/book/determining-firewall-rules.html
upvoted 1 times
...
solutionz
1 year, 2 months ago
Selected Answer: A
When the goal is to map out a stateful firewall rule set, the assessor is likely looking to identify how the firewall responds to different flags in the TCP header. A stateful firewall keeps track of the state of active connections, so understanding its rules requires the use of specific scanning techniques. The command that MOST likely fits this scenario is: A. nmap -sA 192.168.0.1/24 Explanation: -sA: This is the TCP ACK scan option in Nmap. It can be used to map out firewall rule sets, as stateful firewalls may react differently to packets with the ACK flag set. This type of scan can help to understand how the firewall is configured with regards to established connections. The other options are not as suited for mapping a stateful firewall:
upvoted 2 times
...
[Removed]
1 year, 6 months ago
Selected Answer: A
The best option for the assessor to run in order to map out a stateful firewall rule set would be: A. nmap -sA 192.168.0.1/24 The -sA option in Nmap performs a TCP ACK scan, which can be used to determine if a firewall is stateful or not. A stateful firewall keeps track of the state of connections passing through it and can prevent certain types of attacks, such as TCP SYN floods. By sending an ACK packet to a closed port on a target system, the firewall should respond with a reset (RST) packet if it is stateful, indicating that the port is closed. If the firewall is not stateful, it will not respond to the ACK packet. This can help the assessor determine the firewall rule set and potentially identify any weaknesses in the firewall configuration.
upvoted 2 times
...
AaronS1990
1 year, 6 months ago
Selected Answer: A
No one said anything about being stealthy and using a SYN scan From the Nmap website: "CP ACK Scan (-sA) This scan is different than the others discussed so far in that it never determines open (or even open|filtered) ports. It is used to map out firewall rulesets, determining whether they are stateful or not and which ports are filtered."
upvoted 1 times
...
ppsilva
1 year, 7 months ago
Selected Answer: A
There is no need for discussion. It is clear from the NMAP site. Don't just copy the results, READ. It is A !!!! https://nmap.org/book/scan-methods-ack-scan.html
upvoted 4 times
KingIT_ENG
1 year, 7 months ago
what is your answer to questions 28 , 63, 163, 150 ,153, 247 ,243, 227
upvoted 2 times
...
...
KingIT_ENG
1 year, 7 months ago
B is the right answer
upvoted 1 times
...
cy_analyst
1 year, 7 months ago
Selected Answer: B
Option B ("-sS") is the most likely scan to be used for mapping out a stateful firewall rule set because it performs a TCP SYN scan. A TCP SYN scan works by sending a SYN packet to the target host, and if the port is open, the host responds with a SYN-ACK packet. However, if the port is closed, the host responds with a RST packet. By analyzing the responses from the target host, the assessor can determine which ports are open, closed, or filtered by the firewall. Option A ("-sA") is a TCP ACK scan, which is used to determine if a port is filtered or unfiltered. It sends an ACK packet to the target host, and if the port is unfiltered, the host will respond with a RST packet. If the port is filtered, the host will not respond at all. While an ACK scan can provide some information about the firewall, it is not as effective as a SYN scan for mapping out the stateful firewall rule set.
upvoted 3 times
KingIT_ENG
1 year, 7 months ago
https://nmap.org/book/scan-methods-ack-scan.html check iam also confused
upvoted 2 times
...
...
kenechi
1 year, 7 months ago
Selected Answer: A
A - What is stateful firewall (One that keeps state of traffic or packet leaving the internal network to the outside and its return). A TCP Ack scan -sA fools the firewall not to know where the traffic is from and who initiated the traffic. It makes the firewall believe that a SYN-ACK from the inside is sent out and the Ack probe sent is the response to the SYN-ACK. This makes the firewall respond to states if the target is reachable with open services running.
upvoted 4 times
[Removed]
1 year, 7 months ago
As a stateful firewall will keep track of the connection by inspecting the SYN-ACK packet and either allowing or denying the connection, the assessor can infer the firewall rule set from the scan results So B is the correct answer
upvoted 2 times
...
...
kenechi
1 year, 7 months ago
Selected Answer: A
A is the answer. https://nmap.org/book/scan-methods-ack-scan.html
upvoted 4 times
[Removed]
1 year, 7 months ago
Incorrect A answer B is the answer
upvoted 1 times
...
[Removed]
1 year, 7 months ago
B is the answer
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago