New Year Sale ! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

SCP Exam SC0-471 Topic 1 Question 99 Discussion

Actual exam question for SCP's SC0-471 exam
Question #: 99
Topic #: 1
[All SC0-471 Questions]

Often times attackers will run scans against the network to identify different network and operating systems, and resources that are available. If an attacker runs scans on the network, and you are logging the connections, which of the following represent the legitimate combination of packets that will be sent between the attacker and target?

Show Suggested Answer Hide Answer
Suggested Answer: C, E

Contribute your Thoughts:

Chan
3 months ago
I'm going with B) Attacker ACK Scan, Target NULL Response. It's a stealthy way to map out the target's network without raising too many red flags.
upvoted 0 times
Kathrine
2 months ago
I see your point, but I prefer C) Attacker NULL Scan, Target RST Response. It can also provide valuable information without being too obvious.
upvoted 0 times
...
Kaitlyn
2 months ago
I think I would go with D) Attacker SYN Scan, Target NULL Response. It's another sneaky way to probe the target's network.
upvoted 0 times
...
Daniela
2 months ago
That's a good choice. The ACK scan is indeed a stealthy way to gather information without alerting the target.
upvoted 0 times
...
...
Mee
3 months ago
Haha, the attacker better watch out for the 'Ninja Response' from the target, where they just disappear into the shadows! But in all seriousness, I'd go with E) Attacker FIN Scan, Target RST Response.
upvoted 0 times
Jackie
2 months ago
Yeah, it's important to be able to identify and respond to different types of scans.
upvoted 0 times
...
Heike
2 months ago
I agree, that seems like the most legitimate combination of packets.
upvoted 0 times
...
Maurine
2 months ago
I think E) Attacker FIN Scan, Target RST Response is the best choice.
upvoted 0 times
...
...
Mona
3 months ago
I'm not sure, but I think the correct answer might be Attacker ACK Scan, Target NULL Response.
upvoted 0 times
...
Shalon
3 months ago
C) Attacker NULL Scan, Target RST Response sounds about right to me. The NULL scan is designed to evade some basic firewall and IDS detection.
upvoted 0 times
Roxanne
2 months ago
It's important to be aware of these scanning techniques to protect our network.
upvoted 0 times
...
Lorean
2 months ago
I agree, the NULL scan can help the attacker fly under the radar.
upvoted 0 times
...
Willodean
2 months ago
Yes, the NULL scan is a good choice for avoiding detection.
upvoted 0 times
...
Janey
3 months ago
I think you're correct, the NULL scan is a stealthy way to gather information.
upvoted 0 times
...
...
Sherly
3 months ago
I disagree, I believe it would be Attacker NULL Scan, Target RST Response.
upvoted 0 times
...
Leeann
4 months ago
I think the legitimate combination would be Attacker SYN Scan, Target NULL Response.
upvoted 0 times
...
Billi
4 months ago
I think the correct answer is D) Attacker SYN Scan, Target NULL Response. The SYN scan is a common technique used by attackers to identify open ports on a system.
upvoted 0 times
Rolande
3 months ago
User2
upvoted 0 times
...
Kenia
3 months ago
User1
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77