exam questions

Exam PCCET All Questions

View all questions & answers for the PCCET exam

Exam PCCET topic 1 question 79 discussion

Actual exam question from Palo Alto Networks's PCCET
Question #: 79
Topic #: 1
[All PCCET Questions]

Which method is used to exploit vulnerabilities, services, and applications?

  • A. encryption
  • B. port scanning
  • C. DNS tunneling
  • D. port evasion
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Alinutzu
2 months, 2 weeks ago
B. Port scanning Port scanning is a method used to exploit vulnerabilities, services, and applications. It involves scanning a target system or network to identify open ports, services, and potential vulnerabilities. Attackers use port scanning as a reconnaissance technique to discover entry points into a system that can be exploited. Once open ports and services are identified, attackers can attempt to exploit known vulnerabilities or weaknesses in the services or applications running on those ports. This makes port scanning an essential step in the process of identifying and potentially exploiting security weaknesses in a target system.
upvoted 2 times
...
blahblah1234567890000
1 year, 4 months ago
Attack communication traffic is usually hidden with various techniques and tools, including: ● Encryption with SSL, SSH (Secure Shell), or some other custom or proprietary encryption ● Circumvention via proxies, remote access tools, or tunneling. In some instances, use of cellular networks enables complete circumvention of the target network for attack C2 traffic. ● Port evasion using network anonymizers or port hopping to traverse over any available open ports ● Fast Flux (or Dynamic DNS) to proxy through multiple infected endpoints or multiple, ever-changing C2 servers to reroute traffic and make determination of the true destination or attack source difficult ● DNS tunneling is used for C2 communications and data infiltration (for examp
upvoted 1 times
blahblah1234567890000
1 year, 4 months ago
Port scanning would be use to identify services prior to exploitation so it would be in tandem but none of these options are actually used for exploitation.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago