nerdexam
CiscoCisco

200-201 · Question #276

200-201 Question #276: Real Exam Question with Answer & Explanation

The correct answer is C: Gathered information on processes running on the server. An Nmap scan is a reconnaissance tool that primarily helps an attacker gather information about a target server's open ports and the services (processes) running on them, including their versions and operating system details.

Submitted by yuki_2020· Mar 6, 2026Network Intrusion Analysis

Question

Refer to the exhibit. An attacker scanned the server using Nmap. What did the attacker obtain from this scan?

Options

  • AIdentified a firewall device preventing the pert state from being returned.
  • BIdentified open SMB ports on the server
  • CGathered information on processes running on the server
  • DGathered a list of Active Directory users

Explanation

An Nmap scan is a reconnaissance tool that primarily helps an attacker gather information about a target server's open ports and the services (processes) running on them, including their versions and operating system details.

Common mistakes.

  • A. While Nmap can indicate 'filtered' ports which might suggest a firewall, it does not specifically 'identify a firewall device' as an active process or service, nor is 'pert state' standard Nmap output.
  • B. While Nmap can indeed identify open SMB ports (like 445/tcp), option C represents a broader outcome, as Nmap can identify information on many different services and their underlying processes, not just SMB.
  • D. Nmap itself does not directly gather a list of Active Directory users; specific tools or more advanced enumeration techniques, often leveraging identified services like LDAP or SMB, are required for AD user enumeration.

Concept tested. Nmap reconnaissance capabilities

Reference. https://nmap.org/book/man.html

Topics

#Nmap#Network scanning#Port scanning#Reconnaissance

Community Discussion

No community discussion yet for this question.

Full 200-201 PracticeBrowse All 200-201 Questions