Here’s the Answer to the Question posted on Facebook
Q. Network administrators identified what appears to be malicious traffic coming from an internal computer, but only when no one is logged on to the computer. You suspect the system is infected with malware. It periodically runs an application that attempts to connect to web sites over port 80 with Telnet. After comparing the computer with a list of services from the standard image, you verify this application is very likely the problem. What process allowed you to make this determination?
A. Banner grabbing
Answer available until September 16, 2015.
|Get over 400 Security+ (SY0-401 questions here).|
See Chapter 5 of the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide.