exam questions

Exam CSSLP All Questions

View all questions & answers for the CSSLP exam

Exam CSSLP topic 2 question 23 discussion

Actual exam question from ISC's CSSLP
Question #: 23
Topic #: 2
[All CSSLP Questions]

Which of the following techniques is used when a system performs the penetration testing with the objective of accessing unauthorized information residing inside a computer?

  • A. Biometrician
  • B. Van Eck Phreaking
  • C. Port scanning
  • D. Phreaking
Show Suggested Answer Hide Answer
Suggested Answer: that service and application. Answer: D is incorrect. Phreaking is a process used to crack the phone system. The main aim of phreaking is to avoid paying for long- 🗳️
Port scanning identifies open doors to a computer. Hackers and crackers use this technique to obtain unauthorized information.
Port scanning is the first basic step to get the details of open ports on the target system. Port scanning is used to find a hackable server with a hole or vulnerability.
A port is a medium of communication between two computers. Every service on a host is identified by a unique 16-bit number called a port. A port scanner is a piece of software designed to search a network host for open ports. This is often used by administrators to check the security of their networks and by hackers to identify running services on a host with the view to compromising it. Port scanning is used to find the open ports, so that it is possible to search exploits related to distance calls. As telephone networks have become computerized, phreaking has become closely linked with computer hacking. This is sometimes called the H/P equipments are used to pick up the telecommunication signals or data within a computer device.

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
74gjd_37
5 months, 2 weeks ago
Selected Answer: C
C. Port scanning Phreaking is a form of hacking that targets the telephone system. Port scanning is a technique used to detect which ports are open on a target system. By identifying which ports are open on the system, pentesters can determine potential vulnerabilities that may be exploited by attackers seeking unauthorized access. They can also assess whether any services running on those ports are correctly configured and secured appropriately. The purpose of port scanning in penetration testing is not to gain unauthorized access but rather to identify potential attack surfaces so they can be mitigated before an actual attack occurs.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago