Which type of attack is carried out by threat actors against a network to determine which IP addresses, protocols, and ports are allowed by ACLs?
- social engineering
- denial of service
- phishing
- reconnaissance
Explanation: Packet filtering ACLs use rules to filter incoming and outgoing traffic. These rules are defined by specifying IP addresses, port numbers, and protocols to be matched. Threat actors can use a reconnaissance attack involving port scanning or penetration testing to determine which IP addresses, protocols, and ports are allowed by ACLs.
Exam with this question: Modules 13 - 17: Threats and Attacks Group Exam
Exam with this question: CCNA SECFND 210-250 Dumps – Certification Practice Exam Answers
Exam with this question: Modules 24 - 25: Protocols and Log Files Group Exam
Exam with this question: CyberOps Associate (Version 1.0) - CyberOps Associate (200-201) Certification Practice Exam
Exam with this question: Checkpoint Exam: Evaluating Security Alerts Answers
Please login or Register to submit your answer