Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
What is the result if simple network management protocol SNMP is compromised; which of these would attacker have access to?
Usernames
All of these
System tools
ARP tables
TCP connections
The correct response is system tools. If simple network management protocol SNMP is compromised the hacker will have access to network tools. EDIT - please see the following: https://www.sans.org/security-resources/idfaq/using-snmp-for-reconnaissance/9/11 Compromising
SNMP allows an attacker to enumerate usernames, ARP tables, TCP connections, the OS, and allows the attacker to configure network devices. "All of the above" is a correct response. All the given options are available to an attacker who successfully compromises SNMP. mbrowse and getif are two SNMBP MIB browsers.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.