<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	
	>
<channel>
	<title>
	Comments on: CySA+ CS0-001 – Q. 416	</title>
	<atom:link href="https://cloudtech.how/comptia/cysa-cs0-001-q-416/feed/" rel="self" type="application/rss+xml" />
	<link>https://cloudtech.how/comptia/cysa-cs0-001-q-416/</link>
	<description>Cloud Tech Journal</description>
	<lastBuildDate>Mon, 24 Feb 2020 22:59:51 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.0.3</generator>
	<item>
		<title>
		By: Joseph		</title>
		<link>https://cloudtech.how/comptia/cysa-cs0-001-q-416/comment-page-2/#comment-5</link>

		<dc:creator><![CDATA[Joseph]]></dc:creator>
		<pubDate>Mon, 24 Feb 2020 22:59:51 +0000</pubDate>
		<guid isPermaLink="false">https://cloudtech.how/?p=2701#comment-5</guid>

					<description><![CDATA[16.	A cybersecurity is trying to determine the OS of an unidentified devices on the network. A scan produces the following results.

PORT 		STATE		SERVICE
135/TCP		OPEN		rcp
139/TCP		OPEN		netbios-sen
445/TCP		OPEN		ds
3389/TCP	OPEN		tern-serv
4445/TCP	OPEN		upnotifyp
1400/TCP	OPEN		scoty-ft

WHICH OF THE FOLLOWING IS THE MOST LIKELY UNKNOWN DEVICE OPERATING SYSTEM?
a.	Windows
b.	Linux
c.	Solaris
d.	FreeBSD
e.	MacOS]]></description>
			<content:encoded><![CDATA[<p>16.	A cybersecurity is trying to determine the OS of an unidentified devices on the network. A scan produces the following results.</p>
<p>PORT 		STATE		SERVICE<br />
135/TCP		OPEN		rcp<br />
139/TCP		OPEN		netbios-sen<br />
445/TCP		OPEN		ds<br />
3389/TCP	OPEN		tern-serv<br />
4445/TCP	OPEN		upnotifyp<br />
1400/TCP	OPEN		scoty-ft</p>
<p>WHICH OF THE FOLLOWING IS THE MOST LIKELY UNKNOWN DEVICE OPERATING SYSTEM?<br />
a.	Windows<br />
b.	Linux<br />
c.	Solaris<br />
d.	FreeBSD<br />
e.	MacOS</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Cloud Tech		</title>
		<link>https://cloudtech.how/comptia/cysa-cs0-001-q-416/comment-page-1/#comment-4</link>

		<dc:creator><![CDATA[Cloud Tech]]></dc:creator>
		<pubDate>Mon, 24 Feb 2020 16:10:04 +0000</pubDate>
		<guid isPermaLink="false">https://cloudtech.how/?p=2701#comment-4</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://cloudtech.how/comptia/cysa-cs0-001-q-416/comment-page-1/#comment-3&quot;&gt;Joseph&lt;/a&gt;.

I would say c. Rules of engagement]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://cloudtech.how/comptia/cysa-cs0-001-q-416/comment-page-1/#comment-3">Joseph</a>.</p>
<p>I would say c. Rules of engagement</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Joseph		</title>
		<link>https://cloudtech.how/comptia/cysa-cs0-001-q-416/comment-page-1/#comment-3</link>

		<dc:creator><![CDATA[Joseph]]></dc:creator>
		<pubDate>Mon, 24 Feb 2020 01:39:33 +0000</pubDate>
		<guid isPermaLink="false">https://cloudtech.how/?p=2701#comment-3</guid>

					<description><![CDATA[14.	Which of the following defines the components of a penetration test?
a.	Executive summary
b.	After-action report
c.	Rules of engagement
d.	Confidentiality agreement.]]></description>
			<content:encoded><![CDATA[<p>14.	Which of the following defines the components of a penetration test?<br />
a.	Executive summary<br />
b.	After-action report<br />
c.	Rules of engagement<br />
d.	Confidentiality agreement.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
