What is the common target for attackers when they perform port scans?

Study for the CISSP Domain 5 Identity and Access Management Test with flashcards and multiple choice questions. Each question offers hints and explanations. Get ready for success!

Attackers often perform port scans to identify open ports on devices within a network that may be vulnerable to exploitation. Among the various choices, the option highlighting web servers and file servers supporting critical operations stands out as particularly appealing to attackers.

These types of servers typically handle sensitive data and are integral to an organization's operations. As a result, they are prime targets for malicious activities, including exploitation, data breaches, or denial-of-service attacks. Because web servers and file servers often have critical applications running, they are more likely to listen on multiple ports for various services, which can provide potential entry points for attackers.

While personal computers and gaming servers may also be targeted, they do not carry the same level of importance or sensitivity in a business or operational context as critical infrastructure servers do. Furthermore, while any connected device can theoretically be scanned and attacked, attackers will specifically prioritize those systems that pose the greatest value or risk, which typically includes web and file servers handling vital business functions.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy