Buy Existing Paper - Security Posture Assessment Tools


Security Posture Assessment Tools

  1. What command line tool would you use to identify the current network addressing configuration owner Linux host?
  1. Ifconfig
  2. ip
  1.  If you run ‘netstat’ without switches on a Windows host, what output is shown?
  1. The local address
  2. The foreign addresses
  3. TCP ports. The server port is in the “Established” or “Wait” state.
  1.  Why might Nmap fail to identify rogue devices on a network?

The rogue device could be firewalled. It could also be configured in I the probs from generating any response.

  1. What is meant by ‘fingerprinting’ in the context of network scanning?

Identify in details the type of device or appliance, the operating system (OS), its version, or the types of application software and they’re versions as well.

  1. Is it possible to eavesdrop on the traffic passing over a company’s internal network from the internet?

No, it is impossible.

To successfully eavesdrop, the sniffing device has to be connected to the same local network segment.

  1. True or false? A packet sniffer attached to a spanning port would reveal the presence of a rogue device if that device attempted to communicate on the network.

True: Because the packet sniffer and the rogue device would be connected to the same local network segment.

  1.  Is it possible to discover what ports are open on a web server from another computer on the internet?

Yes.Security Posture Assessment Tools

However, the web scanner hands to remain unprotected against port scanning.

  1. What security posture assessment could a pen tester make using Netcat?

Assessing if a network connection can be opened to a remote host

  1. What security posture assessment could a pen tester make using a steganography tool?

Assessing if data can be exfiltrated from a host while avoiding causing alarm to the data owner, for instance, determining if Data Loss Prevention mechanisms can be bypassed.

  1. True or false? A honeypot is designed to prevent network attacks by intercepting them and trapping them within a secure decoy environment.


A honeypot has no capability to intercept attacks and trap them. It can, however, work as a decoy to divert attention from actual computer systems or to identify internal fraud, snooping, and malpractice.