Question 5
While investigating a web attack on a Windows-based server, Jessy executed the following command on her system:
C:\> net view <10.10.10.11>
What was Jessy's objective in running the above command?
Verify the users using open sessions
Check file space usage to look for a sudden decrease in free space
Check whether sessions have been opened with other systems
Review file shares to ensure their purpose
Correct answer: D
Explanation:
Thenet viewcommand in Windows is used to display a list of resources being shared on a computer.When used with a specific computer name or IP address, as innet view <10.10.10.11>, it displays the shared resources available on that particular computer1. Jessy's objective in running this command was likely to review the file shares on the server with the IP address 10.10.10.11 to ensure that they are correctly purposed and not maliciously altered or added as part of the web attack.This command does not verify users using open sessions, check file space usage, or check whether sessions have been opened with other systems. Instead, it specifically lists the shared resources, which can include file shares and printer shares, providing insight into what is being shared from the server in question. This information is crucial during a forensic investigation of a web attack to understand if and how the server's shared resources were compromised or utilized by the attacker.
Thenet viewcommand in Windows is used to display a list of resources being shared on a computer.When used with a specific computer name or IP address, as innet view <10.10.10.11>, it displays the shared resources available on that particular computer1. Jessy's objective in running this command was likely to review the file shares on the server with the IP address 10.10.10.11 to ensure that they are correctly purposed and not maliciously altered or added as part of the web attack.
This command does not verify users using open sessions, check file space usage, or check whether sessions have been opened with other systems. Instead, it specifically lists the shared resources, which can include file shares and printer shares, providing insight into what is being shared from the server in question. This information is crucial during a forensic investigation of a web attack to understand if and how the server's shared resources were compromised or utilized by the attacker.