exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 131 discussion

Actual exam question from CompTIA's SY0-501
Question #: 131
Topic #: 1
[All SY0-501 Questions]

An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:

  • A. Passive reconnaissance
  • B. Persistence
  • C. Escalation of privileges
  • D. Exploiting the switch
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
MelvinJohn
Highly Voted 5 years, 5 months ago
Passive reconnaissance: The process of collecting information about an intended target of a malicious hack without the target knowing what is occurring. Typical passive reconnaissance can include physical observation of an enterprise's building, sorting through discarded computer equipment in an attempt to find equipment that contains data or discarded paper with usernames and passwords, eavesdropping on employee conversations, researching the target through common Internet tools such as Whois, impersonating an employee in an attempt to collect information, and packet sniffing.
upvoted 9 times
Nimaforoughi
4 years, 1 month ago
sniffing, network scanning and vuln scanning are active reccons . DARRIL GIBSON
upvoted 1 times
...
...
mad
Highly Voted 6 years, 2 months ago
It is A passive reconnaissance. Exploiting the switch just with the word “Exploiting” demonstrate that it isn’t passive but highly active so…
upvoted 5 times
...
realdealsunil
Most Recent 4 years, 6 months ago
Great explaination MJ, ty.
upvoted 1 times
...
Fbalex
4 years, 6 months ago
To listen... passive
upvoted 1 times
...
Joker20
4 years, 6 months ago
passive monitoring or active monitoring. Passive monitoring is simply the ability to listen to network traffic and log it. Active monitoring involves the ability to either: ▪ Monitor traffic and then send alerts concerning the traffic that is discovered ▪ Actually intercept and block this traffic https://www.sciencedirect.com/topics/computer-science/passive-monitoring
upvoted 1 times
...
Hanzero
4 years, 11 months ago
just listening so passive
upvoted 1 times
...
ibernal01
5 years, 3 months ago
https://www.sciencedirect.com/topics/computer-science/passive-reconnaissance "In the tools that we are likely to see used in passive reconnaissance, we will find various scanning tools, such as network sniffers for both wired and wireless networks, port scanners, vulnerability analysis tools, operating system fingerprinting tools, banner grabbing tools, and other similar utilities." A- Passive Reconnaissance
upvoted 1 times
...
Aspire
5 years, 10 months ago
answer is D
upvoted 2 times
faxetch1
5 years, 10 months ago
if you're going to suggest an answer, please provide some resources to confirm your answer. the question indicates it is just listening, as mad said previously, exploiting indicates that it is active. https://whatis.techtarget.com/definition/passive-reconnaissance
upvoted 28 times
success101
5 years, 6 months ago
Passive Reconnaissance
upvoted 2 times
...
...
...
DigitalJunkie
6 years ago
Wireshark is a “protocol analyzer”, but it uses only passive observation of network traffic.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...