exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 106 discussion

Actual exam question from CompTIA's PT0-002
Question #: 106
Topic #: 1
[All PT0-002 Questions]

The results of an Nmap scan are as follows:

Which of the following would be the BEST conclusion about this device?

  • A. This device may be vulnerable to the Heartbleed bug due to the way transactions over TCP/22 handle heartbeat extension packets, allowing attackers to obtain sensitive information from process memory.
  • B. This device is most likely a gateway with in-band management services.
  • C. This device is most likely a proxy server forwarding requests over TCP/443.
  • D. This device may be vulnerable to remote code execution because of a buffer overflow vulnerability in the method used to extract DNS names from packets prior to DNSSEC validation.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ryanzou
Highly Voted 2 years, 7 months ago
Selected Answer: B
Vote for B
upvoted 14 times
...
e21089f
Most Recent 3 months, 2 weeks ago
Selected Answer: B
SSH is open, and under Service Info you see Device: router. It's very clearly a gateway with in-band management.
upvoted 3 times
...
Etc_Shadow28000
10 months ago
Selected Answer: B
B. This device is most likely a gateway with in-band management services. Based on the Nmap scan results, the device has the following open ports and services: - 22/tcp open ssh (OpenSSH 6.6.1p1) - 53/tcp open domain (dnsmasq 2.72) - 80/tcp open http (lighttpd) - 443/tcp open ssl/http (httpd) The combination of these services—SSH for remote management, DNS for domain name resolution, and HTTP/HTTPS for web management—suggests that the device is likely functioning as a gateway with in-band management services. It is typical for routers and similar gateway devices to have these services available for administrative tasks and network management.
upvoted 2 times
...
solutionz
1 year, 9 months ago
Selected Answer: B
Based on the Nmap scan results provided, the BEST conclusion about this device is: B. This device is most likely a gateway with in-band management services. The reason for this conclusion is that the open ports (22, 53, 80, and 443) suggest specific services running on the device. OpenSSH on port 22 indicates SSH (Secure Shell) is available, which is commonly used for remote management. Port 53 with dnsmasq suggests DNS services, and ports 80 and 443 indicate HTTP and HTTPS services. The service info also states that it is a Linux device, and the CPE (Common Platform Enumeration) suggests it is a router. Options A, C, and D are not supported by the provided Nmap scan results and service information. There is no mention of Heartbleed vulnerability, proxy server functionality, or buffer overflow vulnerability in the extracted DNS names from packets. Therefore, option B is the most appropriate conclusion based on the information provided.
upvoted 2 times
...
[Removed]
2 years ago
Based on the Nmap scan output provided, the BEST conclusion about this device is option B. This device is most likely a gateway with in-band management services. The evidence for this conclusion is that the device has open ports for SSH (TCP/22), DNS (TCP/53), HTTP (TCP/80) and HTTPS (TCP/443), which are common services for a network gateway. Additionally, the Service Info indicates that the device is running Linux and is a router, which further supports the conclusion that it is a network gateway. Option A is incorrect because there is no evidence of OpenSSL being used on the device, which is a prerequisite for the Heartbleed bug. Option C is unlikely because there is no evidence of a proxy server being used, and TCP/443 is also used for HTTPS traffic. Option D is also unlikely because there is no evidence of a DNS server vulnerability, and the scan did not reveal any information about the DNSSEC validation method being used on the device.
upvoted 1 times
...
RHER
2 years, 1 month ago
Selected Answer: D
LA RESPUESTA CORRECTA ES D https://www.exploit-db.com/exploits/42941
upvoted 1 times
...
KingIT_ENG
2 years, 1 month ago
B is correct answer
upvoted 1 times
...
nickwen007
2 years, 1 month ago
Selected Answer: A
The Heartbleed bug is a security vulnerability that was discovered in the OpenSSL cryptography library in 2014. It allowed attackers to read up to 64kB of memory from an affected server and potentially access sensitive information such as usernames, passwords, cryptographic keys, and other confidential data.
upvoted 1 times
[Removed]
2 years, 1 month ago
the correct answer is B. The heartbleed bug is an openssl bug which does not affect SSH Ref: https://www.sos-berlin.com/en/news-heartbleed-bug-does-not-affect-jobscheduler-or-ssh
upvoted 2 times
...
...
nickwen007
2 years, 1 month ago
In-band management services are services that can be used to remotely administrate and configure network devices. These services include SSH, Telnet, FTP, TFTP, SNMP, and more. They are commonly used in penetration testing activities to gain remote access to a system.
upvoted 4 times
[Removed]
2 years, 1 month ago
yes B is correct
upvoted 2 times
...
...
beamage
2 years, 2 months ago
Selected Answer: D
https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14491#:~:text=Heap%2Dbased%20buffer%20overflow%20in,via%20a%20crafted%20DNS%20response. Read It
upvoted 2 times
beamage
2 years, 2 months ago
No its A this version of SSH uses open SSL and it's vulnerable
upvoted 1 times
...
[Removed]
2 years, 2 months ago
B is the answer
upvoted 2 times
...
beamage
2 years, 2 months ago
Sorry I am Changing my answer it states before 2.78 it was vulnerable Guess I am choosing B
upvoted 4 times
beamage
2 years, 2 months ago
It is definitely vulnerable to heap (Buffer) overflow D d d d
upvoted 2 times
...
[Removed]
2 years, 2 months ago
BBBBBBBBBB Answer
upvoted 2 times
...
...
...
kloug
2 years, 2 months ago
bbbbbbbbbbb
upvoted 3 times
...
2Fish
2 years, 3 months ago
B. Good lord Comptia. "The Best Conclusion" would be that this router has In-band management. It may also be susceptible to DNSMasq. But overall, the best conclusion looks to be a gateway with in-band management. Out of band would be on a completely different network (management network).
upvoted 2 times
...
sempai25
2 years, 4 months ago
Selected Answer: D
dnsmasq CVE-2017-14491
upvoted 3 times
sempai25
2 years, 4 months ago
it's not A because heartbleed is OpenSSL vulnerability
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago