BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

SCP Exam SC0-471 Topic 1 Question 99 Discussion

Actual exam question for SCP's SC0-471 exam
Question #: 99
Topic #: 1
[All SC0-471 Questions]

Often times attackers will run scans against the network to identify different network and operating systems, and resources that are available. If an attacker runs scans on the network, and you are logging the connections, which of the following represent the legitimate combination of packets that will be sent between the attacker and target?

Show Suggested Answer Hide Answer
Suggested Answer: C, E

Contribute your Thoughts:

Chan
30 days ago
I'm going with B) Attacker ACK Scan, Target NULL Response. It's a stealthy way to map out the target's network without raising too many red flags.
upvoted 0 times
Kathrine
13 days ago
I see your point, but I prefer C) Attacker NULL Scan, Target RST Response. It can also provide valuable information without being too obvious.
upvoted 0 times
...
Kaitlyn
20 days ago
I think I would go with D) Attacker SYN Scan, Target NULL Response. It's another sneaky way to probe the target's network.
upvoted 0 times
...
Daniela
23 days ago
That's a good choice. The ACK scan is indeed a stealthy way to gather information without alerting the target.
upvoted 0 times
...
...
Mee
1 months ago
Haha, the attacker better watch out for the 'Ninja Response' from the target, where they just disappear into the shadows! But in all seriousness, I'd go with E) Attacker FIN Scan, Target RST Response.
upvoted 0 times
Jackie
14 days ago
Yeah, it's important to be able to identify and respond to different types of scans.
upvoted 0 times
...
Heike
20 days ago
I agree, that seems like the most legitimate combination of packets.
upvoted 0 times
...
Maurine
23 days ago
I think E) Attacker FIN Scan, Target RST Response is the best choice.
upvoted 0 times
...
...
Mona
1 months ago
I'm not sure, but I think the correct answer might be Attacker ACK Scan, Target NULL Response.
upvoted 0 times
...
Shalon
1 months ago
C) Attacker NULL Scan, Target RST Response sounds about right to me. The NULL scan is designed to evade some basic firewall and IDS detection.
upvoted 0 times
Roxanne
9 days ago
It's important to be aware of these scanning techniques to protect our network.
upvoted 0 times
...
Lorean
13 days ago
I agree, the NULL scan can help the attacker fly under the radar.
upvoted 0 times
...
Willodean
21 days ago
Yes, the NULL scan is a good choice for avoiding detection.
upvoted 0 times
...
Janey
1 months ago
I think you're correct, the NULL scan is a stealthy way to gather information.
upvoted 0 times
...
...
Sherly
2 months ago
I disagree, I believe it would be Attacker NULL Scan, Target RST Response.
upvoted 0 times
...
Leeann
2 months ago
I think the legitimate combination would be Attacker SYN Scan, Target NULL Response.
upvoted 0 times
...
Billi
2 months ago
I think the correct answer is D) Attacker SYN Scan, Target NULL Response. The SYN scan is a common technique used by attackers to identify open ports on a system.
upvoted 0 times
Rolande
2 months ago
User2
upvoted 0 times
...
Kenia
2 months ago
User1
upvoted 0 times
...
...

Save Cancel