Which two options can be used by a threat actor to determine the role of a server? (Choose two.)
A. PCAP
B. tracert
C. running processes
D. hard drive configuration
E. applications
Which two options can be used by a threat actor to determine the role of a server? (Choose two.)
A. PCAP
B. tracert
C. running processes
D. hard drive configuration
E. applications
Page# 225, 226
Answer = C,E
C,E
If we consider the threat actor is using NMAP to profile the hosts and perform his reconnaissance on the victims network, then NMAP would provide both ports that are open and the applications associated with them, from this you could determine the role of the device
E.g.
port 21 would indicate an FTP server
Port 80 or 443 a web server
Think the same CE
CE