Network Reconnaissance Attack | CCIE Security Exam | Cisco

Network Reconnaissance Attack

Prev Question Next Question

Question

Which option is an example of network reconnaissance attack?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

Out of the given options, "Inverse mapping" is an example of network reconnaissance attack.

Network reconnaissance is a method used by attackers to gather information about a target network, with the ultimate goal of finding vulnerabilities that can be exploited to gain unauthorized access. Network reconnaissance attacks are usually the first step in a larger attack campaign and are often performed using automated tools.

Inverse mapping, also known as reverse DNS mapping, is a technique used to discover the hostnames associated with a given IP address. Inverse mapping works by querying a DNS server for the PTR (Pointer) record associated with a given IP address. The PTR record maps the IP address to a hostname, allowing the attacker to gain information about the target system.

Attackers can use inverse mapping to identify specific hosts on a network and their associated services, which can then be used as a basis for further attacks. For example, an attacker could use inverse mapping to identify a host running a vulnerable version of a web server, which could then be targeted with a web application attack.

In contrast, Botnets, Ping of Death, and SYN flooding are not examples of network reconnaissance attacks. Botnets are networks of infected computers that can be controlled remotely by an attacker to carry out various malicious activities. Ping of Death and SYN flooding are denial-of-service (DoS) attacks that are used to disrupt the availability of network resources rather than to gather information about them.