Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?
A. Reverse engineering
B. Fuzzing
C. Penetration testing
D. Network mapping
Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?
A. Reverse engineering
B. Fuzzing
C. Penetration testing
D. Network mapping
16. A cybersecurity is trying to determine the OS of an unidentified devices on the network. A scan produces the following results.
PORT STATE SERVICE
135/TCP OPEN rcp
139/TCP OPEN netbios-sen
445/TCP OPEN ds
3389/TCP OPEN tern-serv
4445/TCP OPEN upnotifyp
1400/TCP OPEN scoty-ft
WHICH OF THE FOLLOWING IS THE MOST LIKELY UNKNOWN DEVICE OPERATING SYSTEM?
a. Windows
b. Linux
c. Solaris
d. FreeBSD
e. MacOS