Application in Information Security Chapter 6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Of the two protocols discussed, TCP and UDP, which is more difficult to scan for?

UDP

Which of the following switches is used for an ACK scan? a. -sI b. -sS c. -sA d. -St

c. -sA

True or False? Nmap is valuable in OS fingerprinting as well as port scanning. True False

True

Which of the following reveals telling information such as version and service data that will help an attacker? a. Banner b. Flag c. Port d. Layer

a. Banner

The process of determining the underlying version of the system program being used is best described as ____ a. OS fingerprinting b. port scanning c. wardialing d. wardriving

a. OS fingerprinting

an XMAS tree scan sets all the following flags except: a. SYN b. URG c. PSH d. FIN

a. SYN

The Nmap command -T Paranoid performs which of the following scans? a. Serial scan; .4 seconds between scans b. Serial scan; 15 seconds between scans c. Serial scan; 300 seconds between scans d. Parallel scan

c. Serial scan; 300 seconds between scans

You have been asked to perform a port scan for POP3. Which port will you scan for? a. 22 b. 25 c. 69 d. 110

d. 110

Which of the following is NOT one of the ways to identify active machines on the network? a. Wardialing b. Wardriving and related activities c. Pinging d. Firewall testing

d. Firewall testing

True or False? Because wardialing involves the use of modems, it is out of date and should no longer be used. True False

False

Which of the following statements is most correct? a. active fingerprinting tools inject packets into network b. passive fingerprinting tools inject traffic into network c. nmap can be used for passive fingerprinting d. passive fingerprinting tools do not require network traffic to fingerprint an OS

a. active fingerprinting tools inject packets into network

_______ is a popular though easily detectable scanning technique. a. full connect b. half-open scanning c. NULL scan d. XMAS tree scan

a. full connect

Which of the following Nmap commands does not perform a parallel scan? a. -T Normal b. -T Sneaky c. -T Aggressive d. -T Insane

b. -T Sneaky

Ping scanning does not identify open ports a. True b. False

b. False

Which of the following is not a network mapping tool? a. SolarWinds b. SuperScan c. IPTables d. Xprobe2

b. SuperScan

Which of the following is the process of locating wireless access points and gaining information about the configuration of each? a. Wardialing b. Wardriving c. Pinging d. Port scanning

b. Wardriving

TCP and UDP both use flags a. true b. false

b. false

Which of the following is the Nmap command-line switch for a full-connect port scan? a. -sS b. -sU c. -sT d. -o

c. -sT

Which of the following is unique among network scanners because it scans ports in parallel using what is known as stateless scanning? a. Nmap b.THC-Amap c. Superscan d. Scanrand

d. Scanrand

Which type of scan is the most reliable but also the easiest to detect? a. TCP SYN scan b. TCP FIN scan c. TCP NULL scan d. TCP connect scan

d. TCP connect scan

Which of the following techniques is not used to locate network access points, but to reveal the presence of access points to others? a. Warflying b. Warwalking c. Warballooning d. Warchalking

d. Warchalking

______ is the point at which an attacker starts to plan their attack a. active OS fingerprinting b. passive OS fingerprinting c. port scanning d. analyzing results

d. analyzing results

Which of the following is an example of a passive fingerprinting tool? a. SuperScan b. Xprobe2 c. Nmap d. p0f

d. p0f


संबंधित स्टडी सेट्स

Chapter 10 - Search & Seaizure: Exceptions to the Warrant Requirement

View Set

involuntary alienation in texas UNIT EXAM

View Set

I/O Psych Ch. 5 test, I/O Psych Test Ch. 4, I/O Psych Test Ch. 3

View Set

Share Draft / Checking account basics

View Set

washington D.C: the nation s capital

View Set

16.1 The endocrine system is one of the body's two major control systems.

View Set