GIAC Cybersecurity Technologies Practice Test 2025 – Complete Exam Prep

Question: 1 / 400

An alert indicates that a compromised host was used by an attacker to run a network scanning command such as nmap -sV or netstat -an. What was the attacker attempting to do?

Map a network drive to a remote host

Identify services running on network hosts

The attacker was attempting to identify services running on network hosts, which is the primary function of the commands mentioned in the alert. Tools like nmap, particularly with the `-sV` option, are specifically designed to detect open ports and determine what services are active on those ports. This process provides valuable information about the system's configuration and vulnerabilities, ultimately aiding the attacker in planning further actions.

By executing the `netstat -an` command, the attacker can view active network connections and listening ports, further allowing them to gather insight into the services operating on the compromised host. This reconnaissance step is crucial for attackers, as it informs their decisions on potential exploitation methods based on the detected services.

In contrast, the other options do not align with the goals associated with running the specified commands. Mapping a network drive, executing scripts, or sending spoofed packets are not the direct functions or outcomes associated with either nmap or netstat's output. Thus, option B accurately captures the intent behind the attacker's actions.

Get further explanation with Examzify DeepDiveBeta

Execute a script on a remote host

Send spoofed packets to network hosts

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy