nerdexam
CompTIACompTIA

PT0-002 · Question #187

PT0-002 Question #187: Real Exam Question with Answer & Explanation

The correct answer is C: Windows Server. The Nmap scan results, particularly the open ports 135 (MSRPC), 139 (NetBIOS-SSN), 445 (SMB), and 3389 (RDP), are characteristic of a Windows operating system. These services are commonly used for remote administration, file sharing, and directory services on Windows environments

Reconnaissance and enumeration

Question

A penetration tester receives the following results from an Nmap scan: Which of the following OSs is the target MOST likely running?

Options

  • ACentOS
  • BArch Linux
  • CWindows Server
  • DUbuntu

Explanation

The Nmap scan results, particularly the open ports 135 (MSRPC), 139 (NetBIOS-SSN), 445 (SMB), and 3389 (RDP), are characteristic of a Windows operating system. These services are commonly used for remote administration, file sharing, and directory services on Windows environments.

Common mistakes.

  • A. CentOS, like other Linux distributions, would typically have different open ports for common services such as SSH (22) and HTTP(S) (80/443), but not commonly MSRPC, NetBIOS-SSN, SMB, or RDP as core services.
  • B. Arch Linux, similar to CentOS, is a Linux distribution and would present with typical Linux service ports like SSH, not natively exposing the combination of MSRPC, NetBIOS, SMB, and RDP.
  • D. Ubuntu, also a Linux distribution, would show open ports typical for Linux systems such as SSH; the specific combination of MSRPC, NetBIOS, SMB, and RDP ports strongly points away from a default or typical Linux configuration.

Concept tested. Nmap OS detection and port identification

Reference. https://nmap.org/book/man-os-detection.html

Topics

#Nmap#OS Fingerprinting#Active Reconnaissance#Enumeration

Community Discussion

No community discussion yet for this question.

Full PT0-002 PracticeBrowse All PT0-002 Questions