Which two options can be used by a threat actor to determine the role of a server?

Which two options can be used by a threat actor to determine the role of a server? (Choose two.)
A. PCAP
B. tracert
C. running processes
D. hard drive configuration
E. applications

cisco-exams

5 thoughts on “Which two options can be used by a threat actor to determine the role of a server?

  1. If we consider the threat actor is using NMAP to profile the hosts and perform his reconnaissance on the victims network, then NMAP would provide both ports that are open and the applications associated with them, from this you could determine the role of the device
    E.g.

    port 21 would indicate an FTP server
    Port 80 or 443 a web server

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.