After receiving reports of high latency, a security analyst performs an Nmap scan and observes the following output: Which of the following suggests the system that produced this output was compromised?
A.
Secure shell is operating on a non-standard port.
B.
There are no indicators of compromise on this system.
C.
MySQL service is identified on a standard PostgreSQL port.
D.
Standard HTTP is open on the system and should be closed.
Looks like a SQL database with a web front-end. All ports are necessary except port 2222 which is making an outbound SSH connection. This is indicative of a reverse shell exploit.
In the provided Nmap scan output, there is no clear evidence suggesting that the system has been compromised. The services mentioned, such as HTTP, HTTPS, SSH, and MySQL, seem to be running on expected ports. There are no unusual or unexpected services or ports mentioned in the scan.
Therefore, the correct answer is:
B. There are no indicators of compromise on this system.
It's essential to note that the presence of open ports or services alone does not necessarily indicate a compromise. However, further analysis, such as reviewing logs, monitoring network traffic, and conducting a thorough investigation, would be necessary to assess the security of the system.
CVE-2007-0655 : The MicroWorld Agent service (MWAGENT.EXE) in MicroWorld Technologies eScan 8.0.671.1, and possibly other versions, allows remote or local attackers to gain privileges and execute arbitrary commands by connecting directly to TCP port 2222.
https://resources.infosecinstitute.com/topics/threat-hunting/threat-hunting-for-mismatched-port-application-traffic/
if an application is using an unusual port which pretends to be a normal application port, then it indicates a sign of compromise. Therefore, this indication of compromise is said to be a “Mismatch Port / Application Traffic”.
I believe the correct answer is D
If we look at the output we see that while port 443 is filtered, port 80 is not. This doesn't make much sense and I could think that the attacker opened it.
In a default configuration for the SSH service port 22 is used. If you want to harden the system you will open the service on another port (2222).
Complicated question
SSH shell is 22. So this is a reverse shell exploit.
Port 2222 Details
The MicroWorld Agent service (MWAGENT. EXE) in MicroWorld Technologies eScan, allows remote or local attackers to gain privileges and execute arbitrary commands by connecting directly to TCP port 2222.
the reason why the analyst conducted the SCAN in the first place is a report of high Latency. High Latency usually occur because of
1- high download volume
2- many application an browser tabs
3- malware
4- streaming services.
i would say that SSH operating on port 2222 is definitely doing some funky shit, i would close that.
Your explanation isn't even what answering B would state.
The questions is effectively asking "something here suggests it was compromised. What?"
Your answer: The fact it says nothing was compromised is what makes me think it was compromised
Is port 3306 necessary?
In general, you should not open port 3306 as it can make your server vulnerable to attack. If you need to connect to your database remotely, there are more secure options than opening port 3306, such as using an SSH tunnel.
While, yes, you should close plain text http... That's not what was asked. There's no indications that the box was compromised...
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.CS0-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
TheSkyMan
Highly Voted 2 years, 9 months ago2Fish
2 years, 3 months ago2Fish
2 years, 3 months agouday1985
1 year, 9 months agosudoaptgoaway
1 year, 9 months agoamateurguy
Highly Voted 2 years, 9 months ago_Bihari_
Most Recent 1 year, 6 months agonovolyus
1 year, 7 months agoJakeH
1 year, 8 months agosudoaptgoaway
1 year, 9 months agogrelaman
1 year, 9 months agokmordalv
1 year, 10 months agocyberrae
2 years, 2 months agoAaronS1990
2 years, 4 months agoLis3yve
2 years, 6 months agoWhite_T_10
2 years, 7 months agoSolventCourseisSCAM
2 years, 8 months agoRiwon
2 years, 3 months agoSAAVYTECH
2 years, 9 months agoAdonist
2 years, 9 months agoAaronS1990
2 years, 4 months agodavid124
2 years, 9 months agoLaudy
2 years, 10 months ago