An attacker has just gained access to the syslog server on a LAN. Reviewing the syslog entries has allowed the attacker to prioritize possible next targets. Which of the following is this an example of?
Passive network footprinting: This involves gathering information about a network without directly interacting with the systems or networks being targeted. By reviewing syslog entries, the attacker is passively collecting information about network activity, system logs, and potentially identifying valuable targets without generating traffic that might alert defenders.
I'm not sure you could consider compromising a machine to view records as "passive". Of the options, though, aside from the word passive, A would be the closest in classification of listing and prioritizing targets.
By reviewing syslog entries, the attacker can identify active services and open ports on various network devices, which helps in prioritizing potential targets. This activity focuses on gathering information about the services and ports in use, which aligns with service port identification.
C. Service port identification: Involves scanning or probing the network to identify open ports and services running on a target machine, which also does not apply here.
So is it B? My test is coming up in a couple days lol
upvoted 2 times
...
...
...
...
This section is not available anymore. Please use the main Exam Page.CS0-003 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Chiniwini
Highly Voted 10 months, 3 weeks agoybyttv
4 days, 10 hours agoMyfeedins479
Most Recent 10 months agoStudybun
10 months, 3 weeks agoMike082588
11 months agoHa89
11 months agogomet2000
10 months agovoiddraco
9 months, 4 weeks ago