Which of the following techniques is MOST likely to gather this type of data?

A malicious user has collected the following list of information:
192.168.1.5 OpenSSH-Server_5.8
192.168.1.7 OpenSSH-Server_5.7
192.168.1.9 OpenSSH-Server_5.7
Which of the following techniques is MOST likely to gather this type of data?

A malicious user has collected the following list of information:
192.168.1.5 OpenSSH-Server_5.8
192.168.1.7 OpenSSH-Server_5.7
192.168.1.9 OpenSSH-Server_5.7
Which of the following techniques is MOST likely to gather this type of data?

A.
Banner grabbing

B.
Port scan

C.
Host scan

D.
Ping scan



Leave a Reply to Test_taker Cancel reply4

Your email address will not be published. Required fields are marked *

3 + 3 =


TT

TT

Isn’t this Banner grabbing? Because this output shows versions but not port.

Test_taker

Test_taker

I think it’s Port Scanning, because it tells the IP and the Server and the Protocol that is open

Paul S

Paul S

Lets look at the information. If it was a port scan, you would have a few IP addresses and a number of open ports. Now, OpenSSL-Server_5.7 could be the name of a system but there are two with different IP addresses–not a name.
So we have an IP address, an Operating system, and version number. This is banner grabbing not port scanning.