exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 247 discussion

Actual exam question from CompTIA's CS0-003
Question #: 247
Topic #: 1
[All CS0-003 Questions]

An attacker has just gained access to the syslog server on a LAN. Reviewing the syslog entries has allowed the attacker to prioritize possible next targets. Which of the following is this an example of?

  • A. Passive network footprinting
  • B. OS fingerprinting
  • C. Service port identification
  • D. Application versioning
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Chiniwini
Highly Voted 10 months, 3 weeks ago
Selected Answer: A
Passive network footprinting: This involves gathering information about a network without directly interacting with the systems or networks being targeted. By reviewing syslog entries, the attacker is passively collecting information about network activity, system logs, and potentially identifying valuable targets without generating traffic that might alert defenders.
upvoted 11 times
ybyttv
4 days, 10 hours ago
Attacker has to invade (gain access) into syslog server. This invade is active, right?
upvoted 1 times
...
...
Myfeedins479
Most Recent 10 months ago
Selected Answer: A
I'm not sure you could consider compromising a machine to view records as "passive". Of the options, though, aside from the word passive, A would be the closest in classification of listing and prioritizing targets.
upvoted 4 times
...
Studybun
10 months, 3 weeks ago
Selected Answer: C
By reviewing syslog entries, the attacker can identify active services and open ports on various network devices, which helps in prioritizing potential targets. This activity focuses on gathering information about the services and ports in use, which aligns with service port identification.
upvoted 1 times
...
Mike082588
11 months ago
How would it be passive if he has direct access onto the network and is viewing the server?
upvoted 3 times
Ha89
11 months ago
these final 20+ questions are not answered by anyone and it's annoying really! I'll just go with C.
upvoted 3 times
gomet2000
10 months ago
C. Service port identification: Involves scanning or probing the network to identify open ports and services running on a target machine, which also does not apply here.
upvoted 3 times
voiddraco
9 months, 4 weeks ago
So is it B? My test is coming up in a couple days lol
upvoted 2 times
...
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...