Which of the following allows attackers to draw a map or outline the target organization's network infrastructure to know about the actual environment that they are going to hack?
C. Scanning networks
Scanning networks allows attackers to draw a map or outline the target organization's network infrastructure to know about the actual environment that they are going to hack. Scanning can help the attacker identify the IP addresses, operating systems, open ports, and running services of the systems connected to the target network. This information can then be used to identify vulnerabilities and plan further attacks.
C. Scanning networks: Network scanning is the process of actively probing a network or systems using tools to discover devices and their details. This would include IP addresses, open ports, services running, and other characteristics. This process is essential for attackers to draw a map or outline of a network infrastructure.
D. Enumeration: Enumeration is a process that goes a step further than scanning. It involves extracting user names, machine names, network resources, shares, and services from a system. While enumeration can provide detailed information and could be part of the process to understand the target environment, it is typically done after scanning networks.
Answer is D: Enumeration.
CEH 50V12 Book: Enumeration P357
Pre-Assessment Phase -
- Identify Assets and Create a Baseline
5. Understand the network architecture and map the network infrastructure
"Scanning networks" makes no mention of mapping.
Answer is D: Enumeration.
CEH 50V12 Book: Enumeration P357
Pre-Assessment Phase -
- Identify Assets and Create a Baseline
5. Understand the network architecture and map the network infrastructure
"Scanning networks" makes no mention of mapping.
C. Scanning networks
Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response
D. Enumeration
Enumeration is the process of extracting information about a target network or system. It allows attackers to gather details about the network infrastructure, such as the IP addresses of active hosts, open ports, services running on those ports, and sometimes even user accounts. This information can help attackers create a map or outline of the target organization's network infrastructure, enabling them to better understand the environment they plan to attack. Enumeration is a reconnaissance technique used by attackers as a preparatory step in hacking.
D. Enumeration
Enumeration involves gathering information about a target network, such as identifying active hosts, open ports, and network services. Attackers use enumeration to create a map or outline of the target organization's network infrastructure, which helps them understand the environment they are planning to exploit. This information is valuable for planning and executing further attacks on the network.
D. Enumeration
Enumeration in cyber security is extracting a system's valid usernames, machine names, share names, directory names, and other information.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
eli117
Highly Voted 1 year, 7 months agog_man_rap
Most Recent 7 months agoqtygbapjpesdayazko
8 months, 1 week agoI_Know_Everything_KY
9 months, 2 weeks agoI_Know_Everything_KY
9 months, 2 weeks agoinsaniunt
11 months, 1 week agoIPconfig
1 year agoiitc_duo
1 year, 1 month ago581777a
1 year, 3 months agoZacharyDriver
1 year, 4 months agonaija4life
1 year, 4 months agoVincent_Lu
1 year, 5 months ago