adplus-dvertising
frame-decoration

Question

Gary ran an Nmap scan of a system and discovered that it is listening on port 22 despite the fact that it should not be accepting SSH connections. What finding should he report?

a.

Shared local administrator credentials

b.

Unnecessary open services

c.

SQL injection vulnerability

d.

No multifactor authentication

Answer: (b).Unnecessary open services Explanation:The only conclusion that Gary can draw from this information is that the server is offering unnecessary services because it is listening for SSH connections when it should not be supporting that service.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Gary ran an Nmap scan of a system and discovered that it is listening on port 22 despite the fact that it should not be accepting SSH connections. What finding should he report?

Similar Questions

Discover Related MCQs

Q. Which one of the following is not a normal communication trigger for a penetration test?

Q. Wendy is reviewing the results of a penetration test and learns that her organization uses the same local administrator password on all systems. Which one of the following tools can help her resolve this issue?

Q. What type of report is the client requesting when they ask for a letter documenting the penetration test results for compliance files?

Q. What should testers observe regarding data retention and destruction at the conclusion of a penetration testing engagement?

Q. What does the level of detail in a formal attestation of findings depend on?

Q. When might a formal attestation of findings be requested in a penetration testing engagement?

Q. What might be included in follow-up actions after a penetration testing engagement?

Q. Why is it often helpful to have a third party moderate the lessons learned session in a penetration testing engagement?

Q. What is the purpose of the lessons learned session in a penetration testing engagement?

Q. What is the purpose of obtaining formal client acceptance in a penetration testing engagement?

Q. What are three important post-engagement cleanup activities highlighted by CompTIA?

Q. What is a basic principle that penetration testers should follow during post-engagement cleanup?

Q. What is an essential post-report delivery activity for penetration testers before closing out a project?

Q. What should be specified in the penetration testing agreement regarding the storage time of the report?

Q. Why is secure handling and disposition of penetration testing reports crucial?

Q. What is the purpose of the "Appendix" section in a penetration testing report?

Q. In the conclusion, what is a common consideration when comparing risk ratings with an organization's risk appetite?

Q. What may be included in the conclusion to provide context for the information presented in the report?

Q. What is the primary purpose of the "Conclusion" section in a penetration testing report?

Q. What is the primary content of the "Findings and Remediation" section in a penetration testing report?