Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

SCP Exam SC0-471 Topic 1 Question 99 Discussion

Actual exam question for SCP's SC0-471 exam
Question #: 99
Topic #: 1
[All SC0-471 Questions]

Often times attackers will run scans against the network to identify different network and operating systems, and resources that are available. If an attacker runs scans on the network, and you are logging the connections, which of the following represent the legitimate combination of packets that will be sent between the attacker and target?

Show Suggested Answer Hide Answer
Suggested Answer: C, E

Contribute your Thoughts:

Chan
12 months ago
I'm going with B) Attacker ACK Scan, Target NULL Response. It's a stealthy way to map out the target's network without raising too many red flags.
upvoted 0 times
Kathrine
11 months ago
I see your point, but I prefer C) Attacker NULL Scan, Target RST Response. It can also provide valuable information without being too obvious.
upvoted 0 times
...
Kaitlyn
11 months ago
I think I would go with D) Attacker SYN Scan, Target NULL Response. It's another sneaky way to probe the target's network.
upvoted 0 times
...
Daniela
12 months ago
That's a good choice. The ACK scan is indeed a stealthy way to gather information without alerting the target.
upvoted 0 times
...
...
Mee
12 months ago
Haha, the attacker better watch out for the 'Ninja Response' from the target, where they just disappear into the shadows! But in all seriousness, I'd go with E) Attacker FIN Scan, Target RST Response.
upvoted 0 times
Jackie
11 months ago
Yeah, it's important to be able to identify and respond to different types of scans.
upvoted 0 times
...
Heike
11 months ago
I agree, that seems like the most legitimate combination of packets.
upvoted 0 times
...
Maurine
12 months ago
I think E) Attacker FIN Scan, Target RST Response is the best choice.
upvoted 0 times
...
...
Mona
1 years ago
I'm not sure, but I think the correct answer might be Attacker ACK Scan, Target NULL Response.
upvoted 0 times
...
Shalon
1 years ago
C) Attacker NULL Scan, Target RST Response sounds about right to me. The NULL scan is designed to evade some basic firewall and IDS detection.
upvoted 0 times
Roxanne
11 months ago
It's important to be aware of these scanning techniques to protect our network.
upvoted 0 times
...
Lorean
11 months ago
I agree, the NULL scan can help the attacker fly under the radar.
upvoted 0 times
...
Willodean
11 months ago
Yes, the NULL scan is a good choice for avoiding detection.
upvoted 0 times
...
Janey
1 years ago
I think you're correct, the NULL scan is a stealthy way to gather information.
upvoted 0 times
...
...
Sherly
1 years ago
I disagree, I believe it would be Attacker NULL Scan, Target RST Response.
upvoted 0 times
...
Leeann
1 years ago
I think the legitimate combination would be Attacker SYN Scan, Target NULL Response.
upvoted 0 times
...
Billi
1 years ago
I think the correct answer is D) Attacker SYN Scan, Target NULL Response. The SYN scan is a common technique used by attackers to identify open ports on a system.
upvoted 0 times
Rolande
1 years ago
User2
upvoted 0 times
...
Kenia
1 years ago
User1
upvoted 0 times
...
...

Save Cancel