Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-002 Topic 1 Question 57 Discussion

Actual exam question for CompTIA's PT0-002 exam
Question #: 57
Topic #: 1
[All PT0-002 Questions]

A penetration tester conducted a discovery scan that generated the following:

Which of the following commands generated the results above and will transform them into a list of active hosts for further analysis?

Show Suggested Answer Hide Answer
Suggested Answer: D

In this scenario, the penetration tester performed a 'Tailgating' attack (D), where the tester follows closely behind a legitimate employee to gain unauthorized access to a secure area without being noticed. This social engineering technique relies on exploiting human tendencies to be polite or avoid confrontation, rather than using technical hacking methods. The tester engaged the employee in casual conversation to appear less suspicious and took advantage of the situation when the employee, perhaps distracted or feeling socially obliged, held the door open for them.


Contribute your Thoughts:

Chantay
19 days ago
I wonder if the person who wrote this question had a little too much coffee before their shift. Some of these options are just plain silly. But hey, at least it keeps us on our toes, right?
upvoted 0 times
...
Keith
20 days ago
Option D is definitely a red herring - 'nmap --o 192.168.0.1-254, cut --f 2'? What kind of nonsense is that? B is the only logical choice here.
upvoted 0 times
...
Jess
23 days ago
Haha, I bet the test-makers are trying to trick us with those other options. Who would use 'sort' or 'uniq' on Nmap output? Option B is clearly the winner here.
upvoted 0 times
...
Yvette
1 months ago
Hmm, the question says the results will be transformed into a list of active hosts, so I'd go with option B as well. Using grep and awk to extract the IP addresses seems like the way to go.
upvoted 0 times
Jame
3 days ago
I would also choose option B. It looks like the best command to extract the IP addresses for further analysis.
upvoted 0 times
...
Alpha
9 days ago
Yeah, I agree. Option B seems like the most efficient way to transform the results into a list of active hosts.
upvoted 0 times
...
Jacob
10 days ago
I think option B is the correct one too. Using grep and awk can help extract the IP addresses easily.
upvoted 0 times
...
...
Walker
1 months ago
Okay, let's see... the output looks like a typical Nmap scan result. I think option B is the correct answer here - 'nmap --sn 192.168.0.1-254, grep ''Nmap scan'' | awk '{print $5},'' will give us a list of active hosts.
upvoted 0 times
Marjory
2 days ago
That makes sense. Option B is the most efficient way to extract a list of active hosts from the Nmap scan results.
upvoted 0 times
...
Jade
9 days ago
I think you're right. Option B uses the --sn flag to perform a ping scan and then filters the output to show only active hosts.
upvoted 0 times
...
Audra
10 days ago
I think option A could also work, using the --oG flag to output in a grepable format and then sorting the results.
upvoted 0 times
...
Benedict
19 days ago
I agree, option B seems like the right choice. It filters out the active hosts based on the Nmap scan results.
upvoted 0 times
...
Sue
22 days ago
I agree, option B seems like the right choice. It filters out the active hosts based on the Nmap scan results.
upvoted 0 times
...
...
Pedro
2 months ago
Hmm, that makes sense. I see your point now.
upvoted 0 times
...
Mozell
2 months ago
I disagree, I believe the answer is B) nmap --sn 192.168.0.1-254 , grep ''Nmap scan'' | awk '{print S5}' because it filters out only the active hosts.
upvoted 0 times
...
Pedro
2 months ago
I think the correct command is A) nmap --oG list.txt 192.168.0.1-254 , sort.
upvoted 0 times
...

Save Cancel