Ethical Hacking Chapter 5
In a Linux script, which of the lines in important because it identifies the file as a script?
#!/bin/sh
When using the text editor vim what command appends text after the insertion point?
A
What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer's OS?
Connect
Which vi command deletes the current line?
Dd
When a TCP three-way handshake endsm both parties send what type of packet to end the connection?
FIN
An open port allows access to specific applications and cannot be vulnerable to attack.
False
In a NULL scan, all packet flags are turned on.
False
Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux
Fping
What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?
Fping
Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP- packets
Hping
What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?
Hping
What open port-scanning tool is considered to be the standard port-scanning tool for security professionals?
NMap
The original utility from which OpenVas was developed
Nessus
A popular Port scanners that has the ability to use a GUI front end
Nmap
Nmap has a GUI front end that makes it easier to work some of the complex options by providing a GUI. Which of the following is the Nmap GUI front end?
Nmap GUI
What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?
OpenVAS
An open-source fork of Nessus
OpenVas
Closed ports respond to a NULL scan with what type of packet?
RST
In normal TCP session, the sender sends a packet to another computer with which of the following flags set?
SYN flag
Attackers typically use scans to get past a firewall or other filtering devices.
True
Port scanning is a method of finding out which services a host computer offers.
True
You can search for vulnerabilities in a host computer by using a port-scanning tool.
True
What type of port scan has the FIN, PHS, and URG flags set?
XMAS scan
In any *NIX system, after saving a script named "script_name," you need to make it executable so that you can run it. Which command will accomplish this task from the command line?
chmod+execute script_name
A port state which does not allow entry or access to a service
closed port
Which of the following describes a flexible program that automates a task that takes too much to perform manually?
customized script
Which statement is where the script performs its main task?
do
A port state that may indicate a firewall is being used to allow specified traffic into or out of the network
filtered port
When security professionals create a packet, they may choose to specifically set which of the following fields to help initiate a response from a target computer?
flag
If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?
limit their scan speeds
A port state tht allows access to applications and can be vulnerable
open port
To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses?
ping
Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts
ping sweep
When using a port-scanner, what procedure can be conducted to identify which IP addresses belong to active hosts?
ping sweep
Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly
port scanning
One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?
reply
Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?
script
Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?
stealth
In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be operating in what state?
unfiltered
When writing a script which statement allows you to avoid creating an endless loop in your script?
while