exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 122 discussion

Actual exam question from CompTIA's CS0-002
Question #: 122
Topic #: 1
[All CS0-002 Questions]

After receiving reports of high latency, a security analyst performs an Nmap scan and observes the following output:

Which of the following suggests the system that produced this output was compromised?

  • A. Secure shell is operating on a non-standard port.
  • B. There are no indicators of compromise on this system.
  • C. MySQL service is identified on a standard PostgreSQL port.
  • D. Standard HTTP is open on the system and should be closed.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
TheSkyMan
Highly Voted 2 years, 9 months ago
Selected Answer: A
Looks like a SQL database with a web front-end. All ports are necessary except port 2222 which is making an outbound SSH connection. This is indicative of a reverse shell exploit.
upvoted 12 times
2Fish
2 years, 3 months ago
Agree, reports of high latency and a service using a non-standard port.
upvoted 1 times
...
2Fish
2 years, 3 months ago
However, to also add, sometimes port 2222 is used for SSH to help avoid potential attacks on the default port. Sooo.. yeah..
upvoted 2 times
uday1985
1 year, 9 months ago
Hacker use it to trick you and you use it to trick hacker :D
upvoted 1 times
...
...
sudoaptgoaway
1 year, 9 months ago
Why do you think its making an outbound ssh connection? It says its open and listening on 2222 which is standard security hardening practice.
upvoted 1 times
...
...
amateurguy
Highly Voted 2 years, 9 months ago
Selected Answer: B
There arent any indicators of compromise as far as i can tell.
upvoted 6 times
...
_Bihari_
Most Recent 1 year, 6 months ago
Selected Answer: B
In the provided Nmap scan output, there is no clear evidence suggesting that the system has been compromised. The services mentioned, such as HTTP, HTTPS, SSH, and MySQL, seem to be running on expected ports. There are no unusual or unexpected services or ports mentioned in the scan. Therefore, the correct answer is: B. There are no indicators of compromise on this system. It's essential to note that the presence of open ports or services alone does not necessarily indicate a compromise. However, further analysis, such as reviewing logs, monitoring network traffic, and conducting a thorough investigation, would be necessary to assess the security of the system.
upvoted 1 times
...
novolyus
1 year, 7 months ago
Selected Answer: A
CVE-2007-0655 : The MicroWorld Agent service (MWAGENT.EXE) in MicroWorld Technologies eScan 8.0.671.1, and possibly other versions, allows remote or local attackers to gain privileges and execute arbitrary commands by connecting directly to TCP port 2222.
upvoted 1 times
...
JakeH
1 year, 8 months ago
Selected Answer: A
This was on the exam. Went with A on this
upvoted 1 times
...
sudoaptgoaway
1 year, 9 months ago
Answer is B. ssh listening on port 2222 is a standard security practice.
upvoted 1 times
...
grelaman
1 year, 9 months ago
Selected Answer: A
https://resources.infosecinstitute.com/topics/threat-hunting/threat-hunting-for-mismatched-port-application-traffic/ if an application is using an unusual port which pretends to be a normal application port, then it indicates a sign of compromise. Therefore, this indication of compromise is said to be a “Mismatch Port / Application Traffic”.
upvoted 1 times
...
kmordalv
1 year, 10 months ago
Selected Answer: D
I believe the correct answer is D If we look at the output we see that while port 443 is filtered, port 80 is not. This doesn't make much sense and I could think that the attacker opened it. In a default configuration for the SSH service port 22 is used. If you want to harden the system you will open the service on another port (2222). Complicated question
upvoted 2 times
...
cyberrae
2 years, 2 months ago
Selected Answer: D
I'm going with D - HTTP and HTTPS both of them doesn't need to be opened at the same time
upvoted 1 times
...
AaronS1990
2 years, 4 months ago
Selected Answer: A
As others have rightly said, this has reverse shell written all over it
upvoted 2 times
...
Lis3yve
2 years, 6 months ago
Selected Answer: A
SSH shell is 22. So this is a reverse shell exploit. Port 2222 Details The MicroWorld Agent service (MWAGENT. EXE) in MicroWorld Technologies eScan, allows remote or local attackers to gain privileges and execute arbitrary commands by connecting directly to TCP port 2222.
upvoted 1 times
...
White_T_10
2 years, 7 months ago
I also go with B as there is no indication of compromise. Nmap is just a port scanner.
upvoted 2 times
...
SolventCourseisSCAM
2 years, 8 months ago
Selected Answer: A
SSH is working on a non-standard port 2222. looks like reverse shell
upvoted 3 times
Riwon
2 years, 3 months ago
And ofcourse, nmap was able to check the version of reverse shell - 5.3 ssh.
upvoted 1 times
...
...
SAAVYTECH
2 years, 9 months ago
the reason why the analyst conducted the SCAN in the first place is a report of high Latency. High Latency usually occur because of 1- high download volume 2- many application an browser tabs 3- malware 4- streaming services. i would say that SSH operating on port 2222 is definitely doing some funky shit, i would close that.
upvoted 6 times
...
Adonist
2 years, 9 months ago
Selected Answer: B
I'd go with B. There's no indication it got compromised. Just that it has open ports.
upvoted 2 times
AaronS1990
2 years, 4 months ago
Your explanation isn't even what answering B would state. The questions is effectively asking "something here suggests it was compromised. What?" Your answer: The fact it says nothing was compromised is what makes me think it was compromised
upvoted 1 times
...
...
david124
2 years, 9 months ago
Is port 3306 necessary? In general, you should not open port 3306 as it can make your server vulnerable to attack. If you need to connect to your database remotely, there are more secure options than opening port 3306, such as using an SSH tunnel.
upvoted 1 times
...
Laudy
2 years, 10 months ago
While, yes, you should close plain text http... That's not what was asked. There's no indications that the box was compromised...
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...