200-201 · Question #276
200-201 Question #276: Real Exam Question with Answer & Explanation
The correct answer is C: Gathered information on processes running on the server. An Nmap scan is a reconnaissance tool that primarily helps an attacker gather information about a target server's open ports and the services (processes) running on them, including their versions and operating system details.
Question
Refer to the exhibit. An attacker scanned the server using Nmap. What did the attacker obtain from this scan?
Options
- AIdentified a firewall device preventing the pert state from being returned.
- BIdentified open SMB ports on the server
- CGathered information on processes running on the server
- DGathered a list of Active Directory users
Explanation
An Nmap scan is a reconnaissance tool that primarily helps an attacker gather information about a target server's open ports and the services (processes) running on them, including their versions and operating system details.
Common mistakes.
- A. While Nmap can indicate 'filtered' ports which might suggest a firewall, it does not specifically 'identify a firewall device' as an active process or service, nor is 'pert state' standard Nmap output.
- B. While Nmap can indeed identify open SMB ports (like 445/tcp), option C represents a broader outcome, as Nmap can identify information on many different services and their underlying processes, not just SMB.
- D. Nmap itself does not directly gather a list of Active Directory users; specific tools or more advanced enumeration techniques, often leveraging identified services like LDAP or SMB, are required for AD user enumeration.
Concept tested. Nmap reconnaissance capabilities
Reference. https://nmap.org/book/man.html
Topics
Community Discussion
No community discussion yet for this question.