ECCouncil EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing ECSAv10 Question # 5 Topic 1 Discussion

ECCouncil EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing ECSAv10 Question # 5 Topic 1 Discussion

ECSAv10 Exam Topic 1 Question 5 Discussion:
Question #: 5
Topic #: 1

Security auditors determine the use of WAPs on their networks with Nessus vulnerability scanner which identifies the commonly used WAPs.

One of the plug-ins that the Nessus Vulnerability Scanner uses is ID #11026 and is named “Access Point Detection”. This plug-in uses four techniques to identify the presence of a WAP.

Which one of the following techniques is mostly used for uploading new firmware images while upgrading the WAP device?


A.

NMAP TCP/IP fingerprinting


B.

HTTP fingerprinting


C.

FTP fingerprinting


D.

SNMP fingerprinting


Get Premium ECSAv10 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.