Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-002 Topic 1 Question 57 Discussion

Actual exam question for CompTIA's PT0-002 exam
Question #: 57
Topic #: 1
[All PT0-002 Questions]

A penetration tester conducted a discovery scan that generated the following:

Which of the following commands generated the results above and will transform them into a list of active hosts for further analysis?

Show Suggested Answer Hide Answer
Suggested Answer: D

In this scenario, the penetration tester performed a 'Tailgating' attack (D), where the tester follows closely behind a legitimate employee to gain unauthorized access to a secure area without being noticed. This social engineering technique relies on exploiting human tendencies to be polite or avoid confrontation, rather than using technical hacking methods. The tester engaged the employee in casual conversation to appear less suspicious and took advantage of the situation when the employee, perhaps distracted or feeling socially obliged, held the door open for them.


Contribute your Thoughts:

Chantay
28 days ago
I wonder if the person who wrote this question had a little too much coffee before their shift. Some of these options are just plain silly. But hey, at least it keeps us on our toes, right?
upvoted 0 times
...
Keith
29 days ago
Option D is definitely a red herring - 'nmap --o 192.168.0.1-254, cut --f 2'? What kind of nonsense is that? B is the only logical choice here.
upvoted 0 times
...
Jess
1 months ago
Haha, I bet the test-makers are trying to trick us with those other options. Who would use 'sort' or 'uniq' on Nmap output? Option B is clearly the winner here.
upvoted 0 times
Dominic
2 days ago
Yeah, using 'sort' or 'uniq' on Nmap output doesn't make sense.
upvoted 0 times
...
Marion
6 days ago
I agree, option B is the most logical choice.
upvoted 0 times
...
...
Yvette
1 months ago
Hmm, the question says the results will be transformed into a list of active hosts, so I'd go with option B as well. Using grep and awk to extract the IP addresses seems like the way to go.
upvoted 0 times
Jame
12 days ago
I would also choose option B. It looks like the best command to extract the IP addresses for further analysis.
upvoted 0 times
...
Alpha
18 days ago
Yeah, I agree. Option B seems like the most efficient way to transform the results into a list of active hosts.
upvoted 0 times
...
Jacob
19 days ago
I think option B is the correct one too. Using grep and awk can help extract the IP addresses easily.
upvoted 0 times
...
...
Walker
2 months ago
Okay, let's see... the output looks like a typical Nmap scan result. I think option B is the correct answer here - 'nmap --sn 192.168.0.1-254, grep ''Nmap scan'' | awk '{print $5},'' will give us a list of active hosts.
upvoted 0 times
Letha
6 days ago
I've used option B before, and it worked perfectly for extracting active hosts. It's definitely the correct command for this scenario.
upvoted 0 times
...
Jutta
6 days ago
I'm not sure about option C or D, they don't seem to be the right commands to extract active hosts from the Nmap scan.
upvoted 0 times
...
Marjory
11 days ago
That makes sense. Option B is the most efficient way to extract a list of active hosts from the Nmap scan results.
upvoted 0 times
...
Jade
18 days ago
I think you're right. Option B uses the --sn flag to perform a ping scan and then filters the output to show only active hosts.
upvoted 0 times
...
Audra
19 days ago
I think option A could also work, using the --oG flag to output in a grepable format and then sorting the results.
upvoted 0 times
...
Benedict
28 days ago
I agree, option B seems like the right choice. It filters out the active hosts based on the Nmap scan results.
upvoted 0 times
...
Sue
1 months ago
I agree, option B seems like the right choice. It filters out the active hosts based on the Nmap scan results.
upvoted 0 times
...
...
Pedro
2 months ago
Hmm, that makes sense. I see your point now.
upvoted 0 times
...
Mozell
2 months ago
I disagree, I believe the answer is B) nmap --sn 192.168.0.1-254 , grep ''Nmap scan'' | awk '{print S5}' because it filters out only the active hosts.
upvoted 0 times
...
Pedro
2 months ago
I think the correct command is A) nmap --oG list.txt 192.168.0.1-254 , sort.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77