Ethical Hacking Chapter 2 Practice Questions
ICMP is disabled on the target server
An attacker has successfully compromised a machine on the network and found a server that is alive on the same network. The attacker tried to ping it but didn't get any response back. What is responsible for this scenario?
Isolate the problem
As a network administrator, Tia is experiencing intermittent security issues. What is the first thing she should do?
/22
CIDR for subnet mask 255.255.252.0
/19
CIDR notation for 255.255.224.0
Link, Internet, Transport, Application
From bottom to top, what order does the TCP/IP architecture use?
4
How many fields are there in a UDP header?
3
How many layers in the OSI model map to the top layer in the TCP/IP architecture?
Seven
Howe many layers are present in the OSI model?
Full mesh
If you needed to guarantee complete fault tolerance, which network architecture would you be most likely to use?
UDP
If you wanted a lightweight protocol to send real-rime data over, what would you use?
RFC
If you were looking for definitive documentation on a protocol, what would you consult?
/15
If you were to see the subnet mask 255.254.0.0, which CIDR notation (prefix) would you use to indicate the same thing?
Only that workstation loses its ability to communicate
In a physical star topology, what happens when a workstation loses its physical connection to another device?
Token Authentication
Jordan, a security manager, allows remote employees to login into the network via a VPN. He is concerned that a remote employee's credentials might be compromised. What will he use to mitigate the risk?
TCP
Joseph, a security analyst, analyzes the network traffic and notices that the SYN flag is set on a packet. Which protocol is in use?
SYN
Juan, a security administrator, wants to analyze a packet trace and identify the packets associated with a new TCP connection. Which of the following flags will be set on the first packet for initiating a new connection?
SYN/ACK
Kylie and Taylor work as security administrators at XYZ. Kylie sends the SYN packet to Taylor in a TCP connection. Which packet does Taylor send back in response to Kylie?
IPSec
Laura works as a security engineer at XYZ. She has been asked to deploy a secure remote access solution that will allow employees to connect to the company's internal network. Which will she implement to minimize the opportunity for the man-in-the-middle attack to occur?
Replace SSL with TLS
Laura, a vulnerability tester, runs a Nessus vulnerability scan of her network and discovers systems running SSL 3.0. What action should she take to remediate this vulnerability?
Always, Never
MAC addresses are ____ local on the LAN and ____ go through or past a router (always/never)
Performing local network addressing
The MAC Address is used for which purpose?
Destination port, source port, checksum, and length
The UDP headers contain which fields?
Colons
The common format of a MAC address is 6 octets (8-bit bytes) generally separated by __________.
Segment
The protocol data unit (PDU) for the Transmission Control Protocol (TCP) is called a _________.
SYN, SYN/ACK, ACK
What are the messages sent as part of a TCP handshake?
TTL
What is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded?
SYN, SYN/ACK, ACK
What is the TCP handshake as described by the flags set?
There is no defined response
What is the defined response to a connection request to a closed UDP port according to the protocol specification?
Better performance
What is the primary advantage of using a switch over a hub?
10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, and 192.168.0.0-192.168.255.255
What is the range for private addresses?
Packet reassembly
What is the use of the IP identification header field?
CIDR
What is used to provide the number of bits in a network prefix?
ff:ff:ff:ff:ff:ff
What represents the broadcast Media Access Control (MAC) address?
/29
Which CIDR does the subnet mask 255.255.255.248 represent?
TTL
Which IP header field indicates how long a message can live on the network before it is considered to be expired?
PaaS
Which cloud-based service model offers customers a platform on which they can develop, run, and manage their applications and services?
Subnet Mask
Which essential information is used to determine whether a destination system is on the same network as the source?
PSH
Which flag is used by a TCP scan to direct the sending system to send buffered data?
IP Identification
Which header field is used to reassemble fragmented IP packets?
UDP Source Port
Which information would a packet filter use to make decisions about what traffic to allow into the network?
Layer 4
Which layer of the OSI model takes care of segmenting messages for transmission?
Star
Which logical topology is commonly used in ethernet networks that use a switch?
Traceroute
Which network diagnostics utility does not work without the use of ICMP?
Star-bus hybrid
Which network topology are you MOST likely to run across in a large enterprise network?
Session
Which of the following layers manages the communication between the endpoints when it comes to maintaining the communication of the applications (the client or server)?
IMP
Which of the following refers to a large computer with specialized interfaces acting as a message gateway?
iCloud
Which of these services would be considered "storage as a service" solution? Microsoft Azure iCloud Google Compute Drop-Leaf
IPSec
Which protocol is a collection of extensions that allow you to encrypt data as it travels from one location to another?
ICMP
Which protocol is necessary to enable the functionality of traceroute?
HTTP
Which protocol would be used to communicate with an IoT device?
TCP
Which protocol would you use for transport if you needed to ensure that all your messages were received and in the correct order?
255.255.128.0
Which subnet mask would you use if the bit pattern was 11111111 11111111 10000000 00000000?
Bus
Which topology consists of a single network cable to which every device on the network connects?
Bus
Your organization has asked you to connect all the computers to a single backbone. Which topology will you use?
Token
Your organization wants to ensure that anyone who has the right to authenticate himself should enter a password, which changes every 40 seconds. Which of the following identification and authentication techniques will the organization select to accomplish this task?
ICMP
oe, a penetration tester, wants to identify the availability of a remote system by sending ping requests out from the company's network. Which protocol will he use to accomplish the task?
/21
CIDR for subnet mask 255.255.248.0
32
A company is using an IPv4 address for the internal network. What represents a valid length in bits of an address that can be used?