New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSNA Exam - Topic 1 Question 77 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 77
Topic #: 1
[All GSNA Questions]

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration. The tool uses raw IP packets to determine the following:

What ports are open on our network systems.

What hosts are available on the network.

Identify unauthorized wireless access points.

What services (application name and version) those hosts are offering.

What operating systems (and OS versions) they are running.

What type of packet filters/firewalls are in use.

Which of the following tools is Victor using?

Show Suggested Answer Hide Answer
Suggested Answer: C

Nmap is a free open-source utility for network exploration and security auditing. It is used to discover computers and services on a computer

network, thus creating a 'map' of the network. Just like many simple port scanners, Nmap is capable of discovering passive services. In

addition, Nmap may be able to determine various details about the remote computers. These include operating system, device type, uptime,

software product used to run a service, exact version number of that product, presence of some firewall techniques and, on a local area

network, even vendor of the remote network card. Nmap runs on Linux, Microsoft Windows etc.

Answer D is incorrect. Kismet is a Linux-based 802.11 wireless network sniffer and intrusion detection system. It can work with any

wireless card that supports raw monitoring (rfmon) mode. Kismet can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet can be

used for the following tasks:

To identify networks by passively collecting packets

To detect standard named networks

To detect masked networks

To collect the presence of non-beaconing networks via data traffic

Answer A is incorrect. Nessus is proprietary comprehensive vulnerability scanning software. It is free of charge for personal use in a

non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. It is capable of checking various types of

vulnerabilities, some of which are as follows:

Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.

Misconfiguration (e.g. open mail relay, missing patches, etc).

Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an

external tool) to launch a dictionary attack.

Denials of service against the TCP/IP stack by using mangled packets.

Answer B is incorrect. A sniffer is a software tool that is used to capture any network traffic. Since a sniffer changes the NIC of the LAN

card into promiscuous mode, the NIC begins to record incoming and outgoing data traffic across the network. A sniffer attack is a passive

attack because the attacker does not directly connect with the target host. This attack is most often used to grab logins and passwords from

network traffic. Tools such as Ethereal, Snort, Windump, EtherPeek, Dsniff are some good examples of sniffers. These tools provide many

facilities to users such as graphical user interface, traffic statistics graph, multiple sessions tracking, etc.


Contribute your Thoughts:

0/2000 characters
Belen
13 hours ago
I thought Nessus was for vulnerability scanning, not just network exploration.
upvoted 0 times
...
Marylyn
6 days ago
Wait, isn't Kismet more for wireless networks specifically?
upvoted 0 times
...
Vesta
11 days ago
Nmap, the Swiss Army knife of network tools. Gotta love its versatility!
upvoted 0 times
...
Blythe
16 days ago
Haha, Sniffer? What is this, the 90s? Nmap is the way to go, hands down.
upvoted 0 times
...
Shannon
21 days ago
Kismet? Really? That's more for wireless network detection, not the full suite of features Victor needs.
upvoted 0 times
...
Carey
26 days ago
Nmap is the obvious choice here. It's a powerful tool for network discovery and port scanning.
upvoted 0 times
...
Dion
1 month ago
I feel like the answer is definitely Nmap, but I wonder if there’s a chance it could be Sniffer instead?
upvoted 0 times
...
Denise
1 month ago
I remember practicing with Nessus, but that’s more for vulnerability scanning, not just network exploration.
upvoted 0 times
...
Gladys
1 month ago
I'm not entirely sure, but Kismet sounds like it could be the right choice for wireless networks.
upvoted 0 times
...
Jacquelyne
2 months ago
This is right in my wheelhouse. Based on the comprehensive network mapping capabilities described, the tool Victor is using is definitely Nmap. It's the industry standard for this type of network reconnaissance.
upvoted 0 times
...
Vashti
2 months ago
I'm a bit confused by all the technical details in this question. I'll need to review my notes on common network security tools and their features to figure out the right answer here.
upvoted 0 times
...
Ellen
2 months ago
Okay, I've got this. The tool that can do all of those things - determine open ports, identify hosts, find wireless APs, enumerate services and OSes, and detect firewalls - has to be Nmap. That's the go-to network scanning utility.
upvoted 0 times
...
Shonda
2 months ago
I think Victor is using Nmap since it’s known for scanning ports and identifying services on hosts.
upvoted 0 times
...
Karol
2 months ago
Yeah, Nmap is the go-to for that kind of stuff.
upvoted 0 times
...
Tresa
3 months ago
Nessus is great for vulnerability assessment, but it doesn't quite fit the bill for what Victor is trying to do. Nmap is the winner.
upvoted 0 times
...
Deeann
3 months ago
I'm pretty sure that's Nmap. It's perfect for network scanning!
upvoted 0 times
...
Janey
3 months ago
Hmm, this is a tricky one. The question mentions a lot of different network discovery and analysis features, so I'll need to carefully consider each option to determine the best fit.
upvoted 0 times
...
Lucia
3 months ago
This looks like a classic network scanning and enumeration question. I'm pretty confident I can identify the right tool based on the capabilities described.
upvoted 0 times
Brandee
2 months ago
I think it's Nmap. It fits all the features.
upvoted 0 times
...
...

Save Cancel