Ethical Hacking Chapter 5

¡Supera tus tareas y exámenes ahora con Quizwiz!

Nmap

A popular Port scanners that has the ability to use a GUI front end

filtered port

A port state that may indicate a firewall is being used to allow specified traffic into or out of the network

open port

A port state tht allows access to applications and can be vulnerable

closed port

A port state which does not allow entry or access to a service

port scanning

Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly

Fping

Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux

False

An open port allows access to specific applications and cannot be vulnerable to attack.

OpenVas

An open-source fork of Nessus

True

Attackers typically use scans to get past a firewall or other filtering devices.

RST

Closed ports respond to a NULL scan with what type of packet?

limit their scan speeds

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?

#!/bin/sh

In a Linux script, which of the lines in important because it identifies the file as a script?

False

In a NULL scan, all packet flags are turned on.

unfiltered

In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be operating in what state?

chmod+execute script_name

In any *NIX system, after saving a script named "script_name," you need to make it executable so that you can run it. Which command will accomplish this task from the command line?

SYN flag

In normal TCP session, the sender sends a packet to another computer with which of the following flags set?

Nmap GUI

Nmap has a GUI front end that makes it easier to work some of the complex options by providing a GUI. Which of the following is the Nmap GUI front end?

reply

One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?

ping sweep

Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts

True

Port scanning is a method of finding out which services a host computer offers.

stealth

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

Nessus

The original utility from which OpenVas was developed

ping

To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses?

Hping

Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP- packets

Hping

What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?

Fping

What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?

NMap

What open port-scanning tool is considered to be the standard port-scanning tool for security professionals?

OpenVAS

What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?

XMAS scan

What type of port scan has the FIN, PHS, and URG flags set?

Connect

What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer's OS?

FIN

When a TCP three-way handshake endsm both parties send what type of packet to end the connection?

flag

When security professionals create a packet, they may choose to specifically set which of the following fields to help initiate a response from a target computer?

ping sweep

When using a port-scanner, what procedure can be conducted to identify which IP addresses belong to active hosts?

A

When using the text editor vim what command appends text after the insertion point?

while

When writing a script which statement allows you to avoid creating an endless loop in your script?

customized script

Which of the following describes a flexible program that automates a task that takes too much to perform manually?

script

Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?

do

Which statement is where the script performs its main task?

Dd

Which vi command deletes the current line?

True

You can search for vulnerabilities in a host computer by using a port-scanning tool.


Conjuntos de estudio relacionados

Financial Statements Test 1 Review Questions

View Set

chapter 4, 5, 6 practice exam ACC 131

View Set