exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 122 discussion

Actual exam question from CompTIA's N10-008
Question #: 122
Topic #: 1
[All N10-008 Questions]

To comply with industry requirements, a security assessment on the cloud server should identify which protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools is the MOST appropriate to complete the assessment?

  • A. Use tcpdump and parse the output file in a protocol analyzer.
  • B. Use an IP scanner and target the cloud WAN network addressing.
  • C. Run netstat in each cloud server and retrieve the running processes.
  • D. Use nmap and set the servers' public IPs as the targets.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
StellarSteve
Highly Voted 1 year, 3 months ago
Selected Answer: D
D. Use nmap and set the servers' public IPs as the targets would be the most appropriate tool to complete the assessment. Nmap is a powerful network scanning tool that can be used to identify open ports, services, and protocols on a remote system. By scanning the public IP addresses of the cloud servers, a security assessment can identify which protocols and services are being exposed to attackers on the Internet. This information can be used to determine potential vulnerabilities and weaknesses in the system.
upvoted 9 times
...
Mehsotopes
Most Recent 7 months, 2 weeks ago
Selected Answer: D
All are useful for checking security, but nmap will show the most comprehensive effect attackers can have on an open protocol, or port that does not have proper security in the shortest amount of time. MitchF's explanation is best.
upvoted 1 times
...
Mehsotopes
7 months, 2 weeks ago
Network Mapper (nmap) = Discovers hosts & services on a computer network by sending packets & analyzing the responses. This provides a number of features for probing computer networks including host discovery service & OS detection. It is a good tool for port scanning, or IP scanning. In addition to this, nmap can be used to conduct fingerprint of the services running on these ports which allows it to identify the versions of software being used. This is really helpful in detecting vulnerabilities & versions of services that are operating on your network. nmap is very useful when trying to create network map, or identification of rogue devices.
upvoted 1 times
...
TheFivePips
10 months ago
Selected Answer: D
The answer is D but im just checking to see if it will let me post. I gave a really detailed answer for the next question and it keeps not letting me submit it.
upvoted 1 times
...
MitchF
10 months, 2 weeks ago
Here is GPT's explanation: The MOST appropriate tool is (D) Use nmap and set the servers' public IPs as the targets. Nmap is a versatile and powerful network scanning tool that can help you identify open ports, services, and protocols running on target systems. By setting the cloud servers' public IPs as targets and using nmap, you can analyze the exposed services and protocols, as well as potential vulnerabilities that attackers could exploit. Option (A) is more suitable for capturing and analyzing network traffic, which can be useful for deep packet inspection, but it might not be as efficient for identifying exposed services and vulnerabilities. Option (B) can identify live hosts and their IP addresses, but it might not provide detailed information about the exposed protocols and weaknesses. Option (C) can provide insight into the local server processes and open ports, but it might not give you a comprehensive view of the exposure from the Internet's perspective."
upvoted 3 times
...
JakeCharles
1 year, 4 months ago
Selected Answer: D
D. Use nmap and set the servers' public IPs as the targets. Nmap (Network Mapper) is a popular and widely-used open source tool for network exploration, management, and security auditing. It can be used to identify which protocols and services are exposed to the Internet on a cloud server, by setting the server's public IP address as the target. Nmap can scan for open ports and associated services, and report on any vulnerabilities that are detected.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...