New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA PT0-003 Exam - Topic 2 Question 26 Discussion

Actual exam question for CompTIA's PT0-003 exam
Question #: 26
Topic #: 2
[All PT0-003 Questions]

[Attacks and Exploits]

You are a penetration tester running port scans on a server.

INSTRUCTIONS

Part 1: Given the output, construct the command that was used to generate this output from the available options.

Part 2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Show Suggested Answer Hide Answer
Suggested Answer: A

Part 1 - 192.168.2.2 -O -sV --top-ports=100 and SMB vulns

Part 2 - Weak SMB file permissions

https://subscription.packtpub.com/book/networking-and-servers/9781786467454/1/ch01lvl1sec13/fingerprinting-os-and-services-running-on-a-target-host


Contribute your Thoughts:

0/2000 characters
Krystina
2 months ago
I thought there were more attack vectors to consider, though.
upvoted 0 times
...
Desmond
2 months ago
Definitely some open ports to check out further.
upvoted 0 times
...
Carin
3 months ago
Wait, are we sure that’s the right command?
upvoted 0 times
...
Yolando
3 months ago
Totally agree, nmap is the go-to for this!
upvoted 0 times
...
Felicitas
3 months ago
Looks like a standard nmap scan output.
upvoted 0 times
...
Fernanda
3 months ago
I feel like I’ve seen this type of question before, where we had to analyze the results of a scan to find potential weaknesses.
upvoted 0 times
...
Zona
4 months ago
I'm a bit confused about how to determine the attack vectors from the output. Do we just focus on the open ports listed?
upvoted 0 times
...
Elroy
4 months ago
I remember practicing with similar questions, and I think we had to look for open ports to identify vulnerabilities.
upvoted 0 times
...
Diego
4 months ago
I think the command might be something like `nmap -sS`, but I'm not entirely sure if that's the right option for this output.
upvoted 0 times
...
Trina
4 months ago
I'm a bit unsure about how to approach this question, but I'll give it my best shot. Analyzing the port scan output and identifying potential attack vectors seems like the key to solving this.
upvoted 0 times
...
Paul
4 months ago
This is a good opportunity to showcase my skills in network reconnaissance and vulnerability assessment. I'll methodically go through the steps and make sure I cover all the bases.
upvoted 0 times
...
Kayleigh
5 months ago
Okay, let me take a close look at the output. I think I can piece together the command based on the information provided, but I'll need to double-check my work to make sure I don't miss anything.
upvoted 0 times
...
Sabrina
5 months ago
Hmm, this looks like a tricky one. I'll need to carefully analyze the port scan output to figure out the command used and identify any potential attack vectors.
upvoted 0 times
...

Save Cancel