Free CompTIA PenTest+ PT0-002 Practice Question

You are conducting a penetration test against an organization and have obtained the following information from an Nmap scan: Nmap scan report for 192.168.1.105 Host is up (0.0010s latency). Not shown: 995 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: 2048 SHA256:XxXXXxxXxxxXxXxxxXxxXxxXxXXXxxXxX (RSA) 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) 111/tcp open rpcbind 2-4 (RPC #100000) 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: WORKGROUP) Based on the fingerprinting data obtained from the scan, which of the following conclusions can be accurately drawn about the target system?

  • The target system is running outdated network services with no implications of the underlying OS.

  • The target system is likely running a Linux-based operating system.

  • The target uses a custom operating system, as indicated by the mix of services.

  • The target system is a dedicated Microsoft Windows Server machine.

This question's topic:
CompTIA PenTest+ PT0-002 / 
Information Gathering and Vulnerability Scanning
Your Score:

Check or uncheck an objective to set which questions you will receive.