Which assessment is used to sniff network traffic to discover active systems, network services, applications, and vulnerabilities?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which assessment is used to sniff network traffic to discover active systems, network services, applications, and vulnerabilities?

Explanation:
Passive assessment focuses on observing network traffic without actively sending probes. By capturing packets with tools like Wireshark or tcpdump, you can see which hosts are communicating, which ports and protocols are in use, and any banners or application data that reveal services and software versions. This information helps identify active systems, the services they offer, the applications in use, and potential weaknesses based on misconfigurations or outdated software—all without generating traffic that could alert defenders. In contrast, active assessment involves probing or scanning hosts, and terms like internal or distributed refer to scope or deployment, not the method of traffic observation. So, the approach that sniffs network traffic to uncover active systems, services, applications, and vulnerabilities is passive assessment.

Passive assessment focuses on observing network traffic without actively sending probes. By capturing packets with tools like Wireshark or tcpdump, you can see which hosts are communicating, which ports and protocols are in use, and any banners or application data that reveal services and software versions. This information helps identify active systems, the services they offer, the applications in use, and potential weaknesses based on misconfigurations or outdated software—all without generating traffic that could alert defenders. In contrast, active assessment involves probing or scanning hosts, and terms like internal or distributed refer to scope or deployment, not the method of traffic observation. So, the approach that sniffs network traffic to uncover active systems, services, applications, and vulnerabilities is passive assessment.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy