New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus CFR-410 Exam - Topic 1 Question 61 Discussion

Actual exam question for CertNexus's CFR-410 exam
Question #: 61
Topic #: 1
[All CFR-410 Questions]

During which of the following attack phases might a request sent to port 1433 over a whole company network be seen within a log?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Eladia
3 months ago
I thought persistence could log it too, but maybe not?
upvoted 0 times
...
Brock
3 months ago
Wait, wouldn’t it also show up in gaining access?
upvoted 0 times
...
Titus
3 months ago
I didn’t know port 1433 was that common!
upvoted 0 times
...
Malinda
3 months ago
Totally agree, scanning makes the most sense here.
upvoted 0 times
...
Samira
3 months ago
Port 1433 is for SQL Server, so it’s likely during scanning.
upvoted 0 times
...
Chauncey
4 months ago
Persistence seems unlikely for this question, but I guess it could depend on how the logs are configured.
upvoted 0 times
...
Louvenia
4 months ago
I practiced a similar question, and I feel like Reconnaissance could also involve sending requests, but I'm leaning towards Scanning.
upvoted 0 times
...
Cecily
4 months ago
I'm not entirely sure, but I remember something about logs capturing traffic during the Gaining access phase too.
upvoted 0 times
...
Leonardo
4 months ago
I think it might be during the Scanning phase since that's when attackers typically probe for open ports like 1433.
upvoted 0 times
...
Scarlet
4 months ago
This is a tricky one. My initial thought was Reconnaissance, but now I'm wondering if it could also be Gaining Access, since the attacker might be trying to exploit a vulnerability on a system listening on port 1433. I'll have to review my notes on the different attack phases.
upvoted 0 times
...
Gail
5 months ago
I think the answer is Scanning. Sending a request to port 1433 across the entire company network seems like it would be part of the scanning phase, where the attacker is actively probing the network for vulnerable systems.
upvoted 0 times
...
Benton
5 months ago
Hmm, I'm a bit confused on this one. I know port 1433 is used for SQL Server, but I'm not sure if that would necessarily be seen in the logs during the reconnaissance phase or a different phase. I'll have to think this through carefully.
upvoted 0 times
...
Chantell
5 months ago
I'm pretty sure this is asking about the reconnaissance phase, since port 1433 is commonly associated with SQL Server and scanning the network for that port could be part of the initial information gathering.
upvoted 0 times
...
Marlon
7 months ago
So, the request sent to port 1433 might be seen during both Reconnaissance and Scanning phases.
upvoted 0 times
...
Antione
7 months ago
Haha, port 1433? More like 'port 1-4-33' am I right? Scanning for sure.
upvoted 0 times
...
Jerry
7 months ago
Persistence, baby! Maintaining that foothold on the network is key.
upvoted 0 times
Rene
6 months ago
B) Scanning
upvoted 0 times
...
Chantell
6 months ago
A) Reconnaissance
upvoted 0 times
...
...
Tomoko
7 months ago
I'm going with Gaining Access. Probing for vulnerable SQL servers to break into.
upvoted 0 times
Frederica
5 months ago
I think it might be Scanning. Trying to find open ports on the network.
upvoted 0 times
...
...
Lizette
7 months ago
Reconnaissance for sure! Trying to map out the network and services before the real fun begins.
upvoted 0 times
Jovita
5 months ago
Scanning comes next, looking for vulnerabilities.
upvoted 0 times
...
Demetra
6 months ago
Reconnaissance is key, gotta gather all the info first.
upvoted 0 times
...
...
Brandon
7 months ago
That's true, but Reconnaissance is more about gathering information.
upvoted 0 times
...
Garry
7 months ago
But wouldn't Reconnaissance also involve scanning for vulnerabilities?
upvoted 0 times
...
Marlon
8 months ago
I agree with Brandon, because scanning involves identifying open ports.
upvoted 0 times
...
Adell
8 months ago
Hmm, port 1433? That's definitely SQL Server. Gotta be Scanning, right?
upvoted 0 times
Timmy
6 months ago
That's right, during the Scanning phase, the attacker is trying to identify potential entry points like port 1433.
upvoted 0 times
...
Noah
7 months ago
Yes, you're correct. Scanning is the phase where the attacker is looking for open ports like 1433.
upvoted 0 times
...
...
Brandon
8 months ago
I think it might be during the Scanning phase.
upvoted 0 times
...

Save Cancel