Exam CS0-003 All QuestionsBrowse all questions from this exam
Question 13

An analyst finds that an IP address outside of the company network that is being used to run network and vulnerability scans across external-facing assets. Which of the following steps of an attack framework is the analyst witnessing?

    Correct Answer: B

    Reconnaissance involves the initial information gathering stage where an attacker seeks to identify and learn about target systems, networks, and potential vulnerabilities. The analyst observing an external IP address conducting network and vulnerability scans signifies a reconnaissance effort, as the attacker is probing for valuable intelligence to inform subsequent phases of the attack.

Discussion
nmap_king_22Option: B

The analyst is witnessing the following step in the attack framework: B. Reconnaissance Explanation: In the context described, where an external IP address is actively conducting network and vulnerability scans across external-facing assets of the company network, this activity aligns with the reconnaissance phase of an attack.

BanesTechOption: B

When an IP address outside of the company network is observed running network and vulnerability scans across external-facing assets, it indicates that the attacker is gathering information about the organization's network infrastructure and potential weaknesses. This activity aligns with the reconnaissance stage, as the attacker is actively probing the target's defenses and vulnerabilities to gather intelligence for potential future attacks. Therefore, the analyst is witnessing the reconnaissance stage of an attack framework.

AlizadeOption: B

The answer is B. Reconnaissance.

6463ab5Option: B

The answer is B: Reconnaissance because of the fact that the IP address is located outside of the company network indicates that someone external to the organization is actively scanning the company's external-facing assets. This aligns with the initial phase of an attack where attackers seek to gather information about potential entry points into the target environment.