New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 4 Question 21 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 21
Topic #: 4
[All CSSLP Questions]

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. You have searched all open ports of the we-are-secure server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of the following tools can you use to accomplish the task?

Show Suggested Answer Hide Answer
Suggested Answer: D

According to the scenario, you have searched all open ports of the we-are-secure server. Now you want to perform the next information-

gathering step, i.e., passive OS fingerprinting. For this, you will use the P0f tool to accomplish the task. P0f is a passive OS fingerprinting tool

that is used to identify the operating system of a target host simply by examining captured packets even when the device is behind a packet

firewall. It does not generate any additional direct or indirect network traffic. P0f can also be used to gather various information, such as

firewall presence, NAT use (for policy enforcement), existence of a load balancer setup, the distance to the remote system and its uptime, etc.

Answer C is incorrect. Nmap is used for active OS fingerprinting. Nmap is a free open-source utility for network exploration and security

auditing. It is used to discover computers and services on a computer network, thus creating a 'map' of the network. Just like many simple

port scanners, Nmap is capable of discovering passive services. In addition, Nmap may be able to determine various details about the remote

computers. These include operating system, device type, uptime, software product used to run a service, exact version number of that

product, presence of some firewall techniques and, on a local area network, even vendor of the remote network card. Nmap runs on Linux,

Microsoft Windows etc.

Answer A is incorrect. SuperScan is a TCP/UDP port scanner. It also works as a ping sweeper and hostname resolver. It can ping a

given range of IP addresses and resolve the host name of the remote system.

The features of SuperScan are as follows:

It scans any port range from a built-in list or any given range.

It performs ping scans and port scans using any IP range.

It modifies the port list and port descriptions using the built in editor.

It connects to any discovered open port using user-specified 'helper' applications.

It has the transmission speed control utility.

Answer B is incorrect. NBTscan is a scanner that scans IP networks for NetBIOS name information. It sends a NetBIOS status query to

each address in a supplied range and lists received information in human readable form. It displays IP address, NetBIOS computer name,

logged-in user name and MAC address of each responded host. NBTscan works in the same manner as nbtstat, but it operates on a range of

addresses instead of just one.


Contribute your Thoughts:

0/2000 characters
Chandra
4 months ago
Wait, can P0f really do passive fingerprinting? Sounds too good to be true!
upvoted 0 times
...
Brandon
4 months ago
Not sure about NBTscan being useful here...
upvoted 0 times
...
Rosina
4 months ago
I always use Superscan for this kind of stuff!
upvoted 0 times
...
Keena
4 months ago
Nmap can do that too, right?
upvoted 0 times
...
Dacia
5 months ago
I think P0f is the best choice for passive OS fingerprinting.
upvoted 0 times
...
Candra
5 months ago
I vaguely recall Superscan being mentioned, but I don't think it’s used for OS fingerprinting. I’d lean towards P0f.
upvoted 0 times
...
Whitney
5 months ago
I feel like Nmap can do a lot, but isn't it more for active scanning? I’m a bit confused about its passive capabilities.
upvoted 0 times
...
Darrin
5 months ago
I think P0f is the one we practiced with for passive fingerprinting. It analyzes traffic without sending packets, right?
upvoted 0 times
...
Mozell
5 months ago
I remember we discussed passive OS fingerprinting in class, but I'm not sure which tool is best for that.
upvoted 0 times
...
Shenika
5 months ago
I'm a bit confused by this question. The relationships between the classes aren't immediately clear to me. I'll need to re-read the code segment and the answer choices a few times to try to understand the underlying logic.
upvoted 0 times
...
Lashawnda
5 months ago
I'm a bit confused here. Do we need to enable IP forwarding on the NAT gateway instance as well? I'm not sure if that's required for this scenario.
upvoted 0 times
...
Santos
5 months ago
The Message Screening pattern is designed to protect against malicious input, so I think the correct answers are A, B, and C. I'll double-check my understanding, but I'm feeling pretty confident about this.
upvoted 0 times
...
Sherell
5 months ago
Okay, I've got a strategy - I'll think about best practices for SAML 2.0 and see if the solution matches up.
upvoted 0 times
...

Save Cancel