Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CS0-003 Topic 4 Question 33 Discussion

Actual exam question for CompTIA's CS0-003 exam
Question #: 33
Topic #: 4
[All CS0-003 Questions]

An analyst investigated a website and produced the following:

Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-21 10:21 CDT

Nmap scan report for insecure.org (45.33.49.119)

Host is up (0.054s latency).

rDNS record for 45.33.49.119: ack.nmap.org

Not shown: 95 filtered tcp ports (no-response)

PORT STATE SERVICE VERSION

22/tcp open ssh OpenSSH 7.4 (protocol 2.0)

25/tcp closed smtp

80/tcp open http Apache httpd 2.4.6

113/tcp closed ident

443/tcp open ssl/http Apache httpd 2.4.6

Service Info: Host: issues.nmap.org

Service detection performed. Please report any incorrect results at https://nmap .org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 20.52 seconds

Which of the following syntaxes did the analyst use to discover the application versions on this vulnerable website?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Dana
2 months ago
Haha, I like how the rDNS record for the IP is 'ack.nmap.org'. Seems like a nod to the Nmap tool.
upvoted 0 times
...
Isabelle
2 months ago
I agree, C is the right answer. The analyst was thorough in their scan, including identifying the Apache and OpenSSH versions.
upvoted 0 times
Abraham
29 days ago
C was definitely the right choice for identifying the application versions.
upvoted 0 times
...
Roxane
1 months ago
The scan report clearly shows the versions of Apache and OpenSSH.
upvoted 0 times
...
Sylvie
1 months ago
Yes, option C includes the -sV flag for version detection.
upvoted 0 times
...
Joni
1 months ago
I think the analyst used option C to discover the application versions.
upvoted 0 times
...
...
Rodney
2 months ago
Yeah, the -sV flag is used for version detection, which is confirmed by the service versions listed in the output.
upvoted 0 times
...
Jean
2 months ago
The output clearly shows the analyst used the -sV option to discover the application versions on the website. The correct answer is C.
upvoted 0 times
Annalee
25 days ago
It's a useful option to gather more information about the services running on a target.
upvoted 0 times
...
Maira
28 days ago
Great job on identifying the correct syntax!
upvoted 0 times
...
Otis
29 days ago
I remember using that option in my own scans before.
upvoted 0 times
...
Shelton
1 months ago
Yes, that's correct. The output clearly shows that.
upvoted 0 times
...
Nohemi
2 months ago
Yes, you are correct. The output clearly shows that.
upvoted 0 times
...
Ria
2 months ago
I think the analyst used the -sV option to discover the application versions on the website.
upvoted 0 times
...
Gary
2 months ago
I think the analyst used the -sV option to discover the application versions.
upvoted 0 times
...
...
Ahmad
2 months ago
I'm not sure about the answer. Can someone explain why option C) is the correct syntax?
upvoted 0 times
...
Leonora
3 months ago
I agree with Lashaunda. Option C) makes sense because it includes the -sV flag for version detection.
upvoted 0 times
...
Lashaunda
3 months ago
I think the analyst used option C) nmap -sV -T4 -F insecure.org to discover the application versions.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77