chapter 13

¡Supera tus tareas y exámenes ahora con Quizwiz!

2. Suppose a scanner discovers a new port, 8888, which is open on a Web server. Which one of the following commands will provide information on the particular network-related process that has opened the port? a. # nmap -p 8888 localhost b. # vmstat c. # lsof -ni d. # telnet localhost 8888

c

6. In what form is SAINT available? a. A virtual machine b. A bootable USB key c. Both A and B d. Neither A nor B

c

13. You want to list open files, focusing the output on network-related processes and organizing the connections by service. Which command can you use? a. lsof -ni b. netstat -atun c. netstat -r d. netstat -t

a

14. Which command uses the ping command to display a list of active systems on a network? a. nmap -sP 10.0.0.0/8 b. nmap 192.168.0.1-3 c. nmap 192.168.0.0/24 d. nmap -sO 192.168.0.3

a

3. Which of the following tools would be most appropriate to periodically scan all Linux servers for vulnerabilities? a. Nessus® b. Tripwire c. AIDE d. Snort

a

4. The security test tool SAINT began as the open source version of __________. a. SATAN b. Nessus® c. Nmap d. Netcat

a

7. After running SAINT, you discover an issue that allows unauthorized access to your network. Which SAINT reporting level does the issue fall under? a. Critical problems b. Areas of concern c. Potential problems d. Services

a

8. What can you use to ensure the integrity of a downloaded package? a. GNU Privacy Guard (GPG) keys b. Knoppix c. The apt -get command d. The yum command

a

1. Which command helps to better understand the networking subsystem? a. nmap b. netstat c. top d. vmstat

b

12. Which tool is generally not used to decrypt and test passwords? a. RainbowCrack b. Nessus® c. Hydra d. John the Ripper

b

15. Of the following virtualization solutions, which one runs Linux systems only as guests? a. Kernel-based Virtual Machine (KVM) b. Microsoft Virtual Server c. VMware d. Virtualbox, open source edition

b

5. To use Nessus®, you must first create a _________. a. static route to the software b. user c. drive mapping d. None of the above

b

9. Which of the following is not an example of live media with penetration testing tools? a. BackTrack b. Nessus c. Knoppix STD d. Network Security Toolkit

b

10. Which command uses the GAPING_SECURITY_HOLE option? a. snort b. nmap c. password d. nc

d

11. You turned off an iptables firewall to test it with the nmap tool. How do you restart the firewall? a. iptables reload b. restart iptables c. iptables shutdown d. iptables restart

d


Conjuntos de estudio relacionados

بيتر ميلاد : شرح وحدات اللغة الأنجليزية 3ث

View Set

Computer Science - Excel Questions

View Set

BYU Writing 045 - Lesson 6 Speedback

View Set

nys real estate licensing study guide part 2

View Set

dump/how things work test review

View Set