Question 116
A vulnerability analyst needs to identity all systems with unauthorized web servers on the 10 1 1 0/24 network.
The analyst uses the following default Nmap scan:
nmap -sV -p 1-65535 10.1.1.0/24
Which of the following would be the result of running the above command?
Question 117
A company has established an ongoing vulnerability management program and procured the latest technology to support it. However, the program is failing because several vulnerabilities have not been detected. Which of the following will reduce the number of false negatives?
Question 118
A vulnerability analyst needs to identity all systems with unauthorized web servers on the
10 1 1 0/24 network. The analyst uses the following default Nmap scan:
nmap -sV -p 1-65535 10.1.1.0/24
Which of the following would be the result of running the above command?
Question 119
Which of the following utilities could be used to resolve an IP address to a daman name, assuming the address has a PTR record?
Question 120
A cybersecurity analyst was asked to discover the hardware address of 30 networked assets. From a
command line, which of the following tools would be used to provide ARP scanning and reflects the MOST
efficient method for accomplishing the task?
