ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 91 Topic 10 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 91 Topic 10 Discussion

EC0-350 Exam Topic 10 Question 91 Discussion:
Question #: 91
Topic #: 10

The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:

Time:Mar 13 17:30:15 Port:20 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:17 Port:21 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:19 Port:22 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:21 Port:23 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:22 Port:25 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:23 Port:80 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:30 Port:443 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

What type of activity has been logged?


A.

Port scan targeting 192.168.1.103


B.

Teardrop attack targeting 192.168.1.106


C.

Denial of service attack targeting 192.168.1.103


D.

Port scan targeting 192.168.1.106


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.