Question

In: Other

You want to test your current security configuration. Which method would you use to avoid detection?...

  1. You want to test your current security configuration. Which method would you use to avoid detection?
  1. Active reconnaissance
  2. Passive reconnaissance
  3. Credentialed vulnerability scan
  4. All of these

  1. You are formulating a vulnerability assessment to be performed by security analysis. Nmap is one of the tools to be used, what information will you expect the program provide about the target host(S)?
  1. Device
  2. Topology
  3. Service
  4. All of these

Solutions

Expert Solution

Answer1:
B: Passive reconnaissance
Explanation-
Passive reconnaissance is the process of collecting information about the target without even entering into the target's system environment. The target gets no knowledge of what is occurring to its system. Typical passive reconnaissance can include physical observation of an enterprise's building, sorting through discarded computer equipment in an attempt to find equipment that contains data or discarded paper with usernames and passwords, eavesdropping on employee conversations, researching the target through common Internet tools, impersonating an employee in an attempt to collect information, packet sniffing, etc.

Hence it is a way in which the attacker can get valuable information about the target without even letting the target know about the attack and so passive reconnaissance is a better option than active reconnaissance for testing the security configuration without letting the system know about it.

In active reconnaissance, the target gets to know that it is being accessed/ attacked by some other system.

Credentialed vulnerability scans are scans in which the scanning computer has an account on the computer being scanned that allows the scanner to do a more thorough check looking for problems that can not be seen from the network. In this method also the target has knowledge about the attacker system as it has got the account in that system. Hence this method is also not suitable to check the security configuration without letting the system know about it.

ANSWER2:
D All of these
Explanation-
DEVICE: One of Nmap's best-known features is remote OS detection using TCP/IP stack fingerprinting. Nmap sends a series of TCP and UDP packets to the remote host and examines practically every bit in the responses. After performing dozens of tests such as TCP ISN sampling, TCP options support and ordering, IP ID sampling, and the initial window size check, Nmap compares the results to its nmap-os-db database having a large database of known OS fingerprints and prints out the OS details if there is a match. Each fingerprint includes a freeform textual description of the OS, and a classification which provides the vendor name (e.g. Sun), underlying OS (e.g. Solaris), OS generation (e.g. 10), and device type (general purpose, router, switch, game console, etc).

TOPOLOGY: Nmap provides an interactive, animated visualization of the connections between hosts on a network. Hosts are shown as nodes on a graph that extends radially from the centre. Clicking on any node makes it as the centre and automatically rearranges all the nodes.

SERVICE: Nmap is a utility tool for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.


Related Solutions

3) Which FOB method would you recommend - what would influence your decision? (would you use...
3) Which FOB method would you recommend - what would influence your decision? (would you use the accounting answer - it depends?) in 200 words
I want to find out which SPSS test I would use in this scenario: In this...
I want to find out which SPSS test I would use in this scenario: In this scenario a social psychologist working for an advertising firm was interested in whether the frequency of exposure to an advertisement would have an effect on the liking of that ad. He suggested that the more often a subject was exposed to an ad would have an effect on how much she / he would enjoy the ad. The study involved exposing a subject to...
Why is the detection of enterococci preferred? Explain. How would you test for enterococci in water...
Why is the detection of enterococci preferred? Explain. How would you test for enterococci in water samples? Explain.
Would you recommend the use of magnetic particle testing for the detection of surface cracks in...
Would you recommend the use of magnetic particle testing for the detection of surface cracks in an aluminum object? Explain your answer. b) How is magnetic particle testing used to detect surface cracks in objects?
Read the article below and analyze it. Which Behaviors Must Leaders Avoid If you want to...
Read the article below and analyze it. Which Behaviors Must Leaders Avoid If you want to empower, engage, or motivate others, don’t just focus on increasing your positive behaviors. Pay attention to what you need to stop doing as well. Why? Because people remember the bad more than the good. To quote from a previous HBR article, How to Play to Your Strengths, “Multiple studies have shown that people pay keen attention to negative information. For example, when asked to...
Question 2 D) Which of the following seaborn functions would you use if you want to...
Question 2 D) Which of the following seaborn functions would you use if you want to compare the variations (or standard deviations) of multiple variables? sns.countplot() sns.boxplot() sns.scatterplot() sns.barplot() E) Which of the following seaborn functions can be used to visualize categorical variables? sns.countplot() sns.pieplot() sns.scatterplot() None of the options F) Which of the following statements is not correct regarding the seaborn pairplot? The pairplot automatically filters numerical values and ignore categorical variables The pairplot uses either scatterplots or regression...
As an Advisor to the President of your country, demonstrate how you would use a method...
As an Advisor to the President of your country, demonstrate how you would use a method to measure the level of employment in the wood processing industry of a region compared to that of a larger area (nation). Evaluate the strengths and weaknesses of the method .
To test the following statistical hypothesis, which statistical test would you use? Younger girls compared to...
To test the following statistical hypothesis, which statistical test would you use? Younger girls compared to older girls (1= younger, 2=older) score higher on self-esteem (total score ranging from 1 to 50). Select one: a. t-test b. paired samples t-test c. Chi-square d. Correlation
Share your thoughts on the current state of the Social Security system. What would your recommendation...
Share your thoughts on the current state of the Social Security system. What would your recommendation be to the President about how to resolve the challenges we are facing with Social Security?
Give a real world example where we would want to use a paired t-test. You should...
Give a real world example where we would want to use a paired t-test. You should use an example in your discipline. , type a short description of the example, and then write your example in the message body.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT