4.0 Assessment Exam 100% Latest
updated!
nmap xxx.xxx.x.x -O
nmap xxx.xxx.x.x -A - ANSWERSA penetration tester is experimenting with Nmap on a
test network. The tester would like to know the operating system of the target device.
Select all Nmap commands that will provide the tester with OS information. (Select all
that apply.)
hping
Nmap - ANSWERSA penetration tester is testing a network's vulnerability. The first test
to perform is to test how well the network's firewall responds to a flood-based Denial of
Service (DoS) attack. What software tools can perform both packet sniffing and a DoS
attack? (Select all that apply.)
route - ANSWERSA cybersecurity investigator is investigating a breach, and the method
of entry is not yet known. The investigator decides to begin by checking for suspicious
entries in the routing table. Select the command-line tool that will enable the investigator
to directly access the table.
Sn1per - ANSWERSA new cybersecurity analyst is working at their first job. The analyst
requires a penetration test reporting and evidence gathering framework that can run
automated tests through integration with Metasploit. Recommend a framework that will
fulfill the analyst's needs.
scanless - ANSWERSA white-hat penetration tester is simulating an attack to check for
vulnerabilities. The first step is to determine if the pen tester can scan for ports or
services that have been left open, without being detected by the Intrusion Prevention
System (IPS). Recommend a tool that fits the pen tester's requirements.
dnsenum - ANSWERSA cybersecurity student has been using dig and whois to query
hosting records and check external DNS services when a fellow student recommends a
tool that packages similar functions and tests into a single query. Conclude what tool
the student recommended.
Nessus - ANSWERSAfter a security breach, a cybersecurity analyst decides to cross-
check the services and software installed on the breached network against lists of
known vulnerabilities. Prescribe a software tool best suited for the analyst's purpose.
cat security.log - ANSWERSA network technician working for a three-letter intelligence
organization has to troubleshoot a specialized, air-gapped Linux device without asking