Ann, a system analyst, discovered the following log. Which of the following or techniques does this indicate? {bp1@localmachine}$ Is-al Total 12 Drwxrwxr-x
A. Protocol analyzer
B. Port scanner
C. Vulnerability
D. Banner grabbing
6 Comments on “Which of the following or techniques does this indicate?”
varsays:
Nessus is a vulnerabitity scanner
0
0
stalinsays:
Why cant someone use Nessus as Protocol Analyzer?
0
0
Brian Gsays:
I agree. I think the answer has to be Vulnerability.
0
0
adminsays:
C is for me, Nessus vulnerability scanner no.1, all in one.
0
0
securityplusmastersays:
Yep, the answer is C. I’m noticing 1 out of 5 of these has the wrong answer.
0
0
meacsays:
The ls -al command is a combination of ls -l (use a long listing format) and ls -a (do not ignore entries starting with .)
The result is a long list (the ls -l part) with (from left to right):
• filetype
• file permissions
• number of links
• owner name
• owner group
• file size
• time of last modification
• the name of the file or directory
• while the ls -a means that hidden files are listed as well.
This means that this command is used for FILES & FOLDERS, and it cannot be used to “analyse protocols”
• This command is not used for Banner Grabbing, and the output shown is not that of a banner
• This command is not used for Port scanning, and the output does not show the state of ports
Nessus is a vulnerabitity scanner
0
0
Why cant someone use Nessus as Protocol Analyzer?
0
0
I agree. I think the answer has to be Vulnerability.
0
0
C is for me, Nessus vulnerability scanner no.1, all in one.
0
0
Yep, the answer is C. I’m noticing 1 out of 5 of these has the wrong answer.
0
0
The ls -al command is a combination of ls -l (use a long listing format) and ls -a (do not ignore entries starting with .)
The result is a long list (the ls -l part) with (from left to right):
• filetype
• file permissions
• number of links
• owner name
• owner group
• file size
• time of last modification
• the name of the file or directory
• while the ls -a means that hidden files are listed as well.
This means that this command is used for FILES & FOLDERS, and it cannot be used to “analyse protocols”
• This command is not used for Banner Grabbing, and the output shown is not that of a banner
• This command is not used for Port scanning, and the output does not show the state of ports
So the best answer is: C.Vulnerability
0
0