New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA CAS-005 Exam - Topic 3 Question 2 Discussion

Actual exam question for CompTIA's CAS-005 exam
Question #: 2
Topic #: 3
[All CAS-005 Questions]

SIMULATION

You are a security analyst tasked with interpreting an Nmap scan output from company's privileged network.

The company's hardening guidelines indicate the following:

There should be one primary server or service per device.

Only default ports should be used.

Non-secure protocols should be disabled.

INSTRUCTIONS

Using the Nmap output, identify the devices on the network and their roles, and any open ports that should be closed.

For each device found by Nmap, add a device entry to the Devices Discovered list, with the following information:

The IP address of the device

The primary server or service of the device (Note that each IP should by associated with one service/port only)

The protocol(s) that should be disabled based on the hardening guidelines (Note that multiple ports may need to be closed to comply with the hardening guidelines)

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Show Suggested Answer Hide Answer
Suggested Answer: A

10.1.45.65 SFTP Server Disable 8080

10.1.45.66 Email Server Disable 415 and 443

10.1.45.67 Web Server Disable 21, 80

10.1.45.68 UTM Appliance Disable 21


Contribute your Thoughts:

0/2000 characters
Wilburn
3 months ago
I think some of those open ports are actually necessary though.
upvoted 0 times
...
Adelle
3 months ago
Default ports only? They better fix that ASAP!
upvoted 0 times
...
Art
3 months ago
Wait, are they really using non-secure protocols? That's surprising!
upvoted 0 times
...
Hoa
4 months ago
Totally agree, that's a big no-no for hardening!
upvoted 0 times
...
Levi
4 months ago
Looks like we have multiple services on some devices.
upvoted 0 times
...
Vince
4 months ago
I think I need to double-check which protocols are considered non-secure. I remember SSH is secure, but what about FTP?
upvoted 0 times
...
Nana
4 months ago
I’m a bit confused about how to determine the primary service for each IP. Do we just pick the first one listed in the scan?
upvoted 0 times
...
Garry
4 months ago
This question feels similar to the practice exam where we had to close non-secure protocols. I think I need to focus on the default ports listed in the guidelines.
upvoted 0 times
...
Elouise
5 months ago
I remember we practiced identifying services based on Nmap output, but I’m not sure how to handle multiple open ports on one device.
upvoted 0 times
...
Phung
5 months ago
No problem, I've got this. I'll quickly review the Nmap data, identify the devices and services, and then check the guidelines to see what needs to be closed. Should be a straightforward exercise, just need to stay organized and methodical.
upvoted 0 times
...
Gilma
5 months ago
Whoa, this is a lot of information to process. I better take my time and really understand the Nmap output before trying to apply the hardening guidelines. Don't want to miss anything important. Gotta be thorough here.
upvoted 0 times
...
Carmen
5 months ago
Alright, time to put my security analysis skills to the test. I'll start by mapping out the devices and their services, then cross-reference that with the hardening guidelines to identify any non-secure protocols or open ports that need to be closed. Shouldn't be too difficult, but I'll need to stay focused.
upvoted 0 times
...
Joni
5 months ago
Okay, let's see what we've got here. The Nmap output shows a few different devices, and I'll need to determine the primary service for each one and make sure they're using the default ports. This should be straightforward, but I'll need to double-check the hardening guidelines to ensure I'm closing the right ports.
upvoted 0 times
...
Ernestine
5 months ago
Hmm, this looks like a tricky one. I'll need to carefully analyze the Nmap output to identify the devices and their roles, and then check which ports need to be closed based on the hardening guidelines.
upvoted 0 times
...
Holley
1 year ago
Looks like we got a real 'Port-a-Potty' situation here. Time to flush those non-secure protocols!
upvoted 0 times
...
Phuong
1 year ago
Wait, is that an FTP server on port 21? Someone's been watching too many old hacker movies.
upvoted 0 times
...
Raina
1 year ago
Hmm, I bet the network admin had a long night trying to figure this one out. Glad I'm not the one cleaning up this mess.
upvoted 0 times
Bok
1 year ago
I agree, the network admin must have had a tough time figuring out all the devices and open ports.
upvoted 0 times
...
Shawn
1 year ago
Yeah, it looks like a lot of work to clean up this network mess.
upvoted 0 times
...
...
Nelida
1 year ago
I'm seeing a lot of open ports that need to be locked down. This is why we have hardening guidelines, people!
upvoted 0 times
Marvel
1 year ago
Once we have all the information, we can close the open ports to comply with the hardening guidelines.
upvoted 0 times
...
Owen
1 year ago
We also need to disable any non-secure protocols based on the guidelines.
upvoted 0 times
...
Simona
1 year ago
Let's start by adding the IP addresses and primary servers of each device.
upvoted 0 times
...
Millie
1 year ago
We need to identify the devices on the network and their roles.
upvoted 0 times
...
...
Katy
1 year ago
Looks like we got a mix of standard and non-standard ports here. Gotta be careful with those pesky protocols.
upvoted 0 times
Natalie
1 year ago
User 4: We should follow the hardening guidelines and close those extra ports.
upvoted 0 times
...
Zana
1 year ago
User 3: Let's make sure each device has only one primary server or service.
upvoted 0 times
...
Flo
1 year ago
User 2: Agreed, we need to disable those non-secure protocols.
upvoted 0 times
...
Kristofer
1 year ago
User 1: I see some non-standard ports that need to be closed.
upvoted 0 times
...
...
Dwight
1 year ago
I think we should focus on identifying the devices and their roles first.
upvoted 0 times
...
Justine
1 year ago
I agree, we need to carefully analyze the Nmap output.
upvoted 0 times
...
Roosevelt
1 year ago
This question seems challenging.
upvoted 0 times
...

Save Cancel