Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSNA Topic 1 Question 67 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 67
Topic #: 1
[All GSNA Questions]

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He begins to perform a pre-attack test before conducting an attack on the We-are-secure server. Which of the following will John perform in the pre-attack phase?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, D, E

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows:

1.Information gathering

2.Determining network range

3.Identifying active machines

4.Finding open ports and applications

5.OS fingerprinting

6.Fingerprinting services

7.Mapping the network

Answer C is incorrect. In the enumeration phase, the attacker gathers information such as the network

user and group names, routing

tables, and Simple Network Management Protocol (SNMP) data. The techniques used in this phase are as follows:

1.Obtaining Active Directory information and identifying vulnerable user accounts

2.Discovering NetBIOS names

3.Employing Windows DNS queries

4.Establishing NULL sessions and queries


Contribute your Thoughts:

Javier
27 days ago
Finding open ports and applications? Might as well roll out the welcome mat for John!
upvoted 0 times
Lynna
12 days ago
User 1
upvoted 0 times
...
...
Martin
29 days ago
Enumeration, huh? Sounds like John's gonna be a regular Sherlock Holmes on this one.
upvoted 0 times
...
Theola
1 months ago
Information gathering is key - can't just go in blind, gotta know what you're up against.
upvoted 0 times
Kina
2 days ago
C) Enumeration
upvoted 0 times
...
Melina
3 days ago
B) Identifying active machines
upvoted 0 times
...
Iraida
7 days ago
A) Determining network range
upvoted 0 times
...
...
Maybelle
1 months ago
Definitely need to do some recon before the actual attack. Gotta identify those active machines and open ports first!
upvoted 0 times
Dona
24 days ago
User3: Don't forget about finding open ports and applications during the pre-attack phase.
upvoted 0 times
...
Gracia
26 days ago
User2: Yes, and he also needs to identify the active machines on the server.
upvoted 0 times
...
Iluminada
28 days ago
User1: John should definitely start by determining the network range.
upvoted 0 times
...
...
Nobuko
1 months ago
Identifying active machines and finding open ports and applications are also important in the pre-attack phase.
upvoted 0 times
...
Aliza
2 months ago
I think John will also determine the network range.
upvoted 0 times
...
Haydee
2 months ago
John will perform information gathering in the pre-attack phase.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77