Which of the following approaches can be utilized to determine how this node operates?

An engineer is reviewing the security architecture for an enterprise network. During the review, the engineer notices an undocumented node on the network.
Which of the following approaches can be utilized to determine how this node operates? (Choose two.)
A. Use reverse engineering and techniques
B. Assess the node within a continuous integration environment
C. Employ a static code analyzer
D. Review network and traffic logs
E. Use a penetration testing framework to analyze the node
F. Analyze the output of a ping sweep

How to PASS CAS-004 in First Attempt?

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

5 thoughts on “Which of the following approaches can be utilized to determine how this node operates?

    1. I agree with D. But why F with a ping sweep? It’s a single device and a ping would just tell us it responds to ICMP echos. We already know it exists from the question. I’d say D and E. Try to directly interact with it using a tool-set or scanner.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.