Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil ECSS Exam - Topic 9 Question 112 Discussion

Actual exam question for Eccouncil's ECSS exam
Question #: 112
Topic #: 9
[All ECSS Questions]

Bob, a professional hacker, targeted an organization to launch attacks. Bob gathered information such as network topology and a list of live hosts. Based on the collected information, he launched further attacks over the organization's network.

Identify the type of network attack Bob initiated on the target organization in the above scenario.

Show Suggested Answer Hide Answer
Suggested Answer: D

In the given scenario, Bob's actions align with the concept ofenumeration. Here's why:

Network Reconnaissance: Bob collected information about the organization's network topology and a list of live hosts. This initial step is part of network reconnaissance, where an attacker gathers details about the target system.

Enumeration: After collecting this information, Bob proceeded to launch further attacks. Enumeration involves actively probing a network to identify services, users, shares, and other system details. It helps attackers understand the target environment better.

Purpose of Enumeration: By identifying live hosts and understanding the network topology, Bob can tailor subsequent attacks more effectively. Enumeration provides crucial insights for attackers during the reconnaissance phase.


EC-Council Certified Security Specialist (E|CSS) course materials and study guide12.

Contribute your Thoughts:

0/2000 characters
Felicidad
4 days ago
Agreed! Enumeration fits. He collected data before attacking.
upvoted 0 times
...
Marlon
9 days ago
I think it's D) Enumeration. Bob gathered info first.
upvoted 0 times
...
Celeste
14 days ago
I don’t know, this seems too straightforward.
upvoted 0 times
...
Jaclyn
1 month ago
I agree, it’s all about that enumeration phase.
upvoted 0 times
...
Maile
1 month ago
Wait, are we sure it’s not session hijacking?
upvoted 0 times
...
Stefany
1 month ago
Definitely D, he was gathering info first.
upvoted 0 times
...
Jani
2 months ago
Sounds like enumeration to me.
upvoted 0 times
...
Mitsue
2 months ago
Haha, Bob must be a real pro if he's doing "enumeration" instead of just randomly clicking buttons. D) is the way to go.
upvoted 0 times
...
Ma
2 months ago
D) Enumeration, no doubt. Bob was doing his homework before trying to break in.
upvoted 0 times
...
Roxanne
2 months ago
Definitely D) Enumeration. Bob was doing some serious reconnaissance before moving on to the actual attack.
upvoted 0 times
...
Yan
2 months ago
I agree, D) Enumeration is the most appropriate choice. Gathering information is the first step in a targeted attack.
upvoted 0 times
...
Azalee
2 months ago
D) Enumeration seems like the correct answer here. Bob gathered information about the network before launching further attacks.
upvoted 0 times
...
Rupert
3 months ago
Enumeration sounds right to me too, especially since it involves collecting details about the network before launching an attack.
upvoted 0 times
...
Ressie
3 months ago
I think the key here is that Bob gathered information about the network topology and live hosts before launching further attacks. That sounds like he was doing some reconnaissance and enumeration to gather intelligence about the target organization. I'm going to go with option D.
upvoted 0 times
...
Iesha
3 months ago
I'm a bit confused here. The question doesn't give a lot of details about the specific attack method Bob used. I'm not sure if I can confidently identify the type of attack from the information provided.
upvoted 0 times
...
Derick
3 months ago
Buffer overflow seems like a possibility, but I feel like that usually involves exploiting software vulnerabilities directly rather than just gathering info first.
upvoted 0 times
...
Renea
3 months ago
I'm not entirely sure, but I remember something about session hijacking being more about taking over active sessions, which doesn't seem to fit here.
upvoted 0 times
...
Laura
4 months ago
Okay, let me think this through. Based on the information provided, it seems like Bob was doing some initial reconnaissance and information gathering before launching an attack. So I'm going to go with option D, Enumeration.
upvoted 0 times
...
Christiane
4 months ago
I think this might be related to enumeration since Bob gathered information about the network and live hosts before attacking.
upvoted 0 times
...
Caitlin
4 months ago
Hmm, I'm not sure. The question mentions Bob launching attacks, so it could be a question about the type of attack he used, like session hijacking or buffer overflow.
upvoted 0 times
...
Chantell
4 months ago
I think this is a question about network reconnaissance and enumeration. Bob was gathering information about the target network before launching further attacks.
upvoted 0 times
Jaclyn
4 months ago
Session hijacking doesn't match this scenario.
upvoted 0 times
...
...

Save Cancel