exam questions

Exam CSSLP All Questions

View all questions & answers for the CSSLP exam

Exam CSSLP topic 1 question 28 discussion

Actual exam question from ISC's CSSLP
Question #: 28
Topic #: 1
[All CSSLP Questions]

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. In order to do so, he performs the following steps of the pre-attack phase successfully: Information gathering Determination of network range Identification of active systems Location of open ports and applications Now, which of the following tasks should he perform next?

  • A. Perform OS fingerprinting on the We-are-secure network.
  • B. Map the network of We-are-secure Inc.
  • C. Install a backdoor to log in remotely on the We-are-secure server.
  • D. Fingerprint the services running on the we-are-secure network.
Show Suggested Answer Hide Answer
Suggested Answer: number of hops reveals the OS of the remote system. Answer: D and B are incorrect. John should perform OS fingerprinting first, after which it will be easy to 🗳️
John will perform OS fingerprinting on the We-are-secure network. Fingerprinting is the easiest way to detect the Operating System (OS) of a remote system. OS detection is important because, after knowing the target system's OS, it becomes easier to hack into the system. The comparison of data packets that are sent by the target system is done by fingerprinting. The analysis of data packets gives the attacker a hint as to which operating system is being used by the remote system. There are two types of fingerprinting techniques as follows: 1.Active fingerprinting 2.Passive fingerprinting In active fingerprinting ICMP messages are sent to the target system and the response message of the target system shows which OS is being used by the remote system. In passive fingerprinting the identify which services are running on the network since there are many services that run only on a specific operating system. After performing OS fingerprinting,
John install a backdoor.

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
anuradha1306
5 months ago
Selected Answer: D
D. Fingerprint the services running on the we-are-secure network. After gathering information, determining the network range, identifying active systems, and locating open ports and applications, the next logical step is to fingerprint the services running on the network. Service fingerprinting involves analyzing the network services and applications to determine their specific versions, configurations, and vulnerabilities. By fingerprinting the services, John can gain a better understanding of the target system's software and potentially identify any known vulnerabilities associated with those services. This information will be crucial for the subsequent steps in the ethical hacking process, such as vulnerability scanning and exploitation.
upvoted 1 times
...
4e3rv21rq3vq2q
1 year, 3 months ago
Selected Answer: A
Correct Answer: A
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago