CH5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Why would an attacker conduct an open TCP connection scan using Ncat? A. The attacker does not want to attack the system. B. The attacker made a mistake using the nmap function. C. The attacker is trying to connect to network services. D. The attacker is trying to see what ports are open for connection.

D. The attacker is trying to see what ports are open for connection.

Which Nmap switch utilizes the slowest scan? A. -T B. -sT C. -s0 D. -sX

A. -T

What is an ICMP echo scan? A. A ping sweep B. A SYN scan C. A Xmas tree scan D. Part of a UDP scan

A. A ping sweep

nmap is required to perform what type of scan? A. Port scan B. Vulnerability scan C. Service scan D. Threat scan

A. Port scan

Which of following actions is the last step in scanning a target? A. Scan for vulnerabilities. B. Identify live systems. C. Discover open ports. D. Identify the OS and servers

A. Scan for vulnerabilities.

An SYN attack uses which protocol? A. TCP B. UDP C. HTTP D. Telnet

A. TCP

Which of the following is used for banner grabbing? A. Telnet B. FTP C. SSH D. Wireshark

A. Telnet

What is the three-way handshake? A. The opening sequence of a TCP connection B. A type of half-open scan C. A Xmas tree scan D. Part of a UDP scan

A. The opening sequence of a TCP connection

Why is it important to scan your target network slowly? A. To avoid alerting the IDS B. It is not necessary to scan the network slowly. C. To evade the firewall D. Services may not have started, so starting slowly ensures that you capture services that started late.

A. To avoid alerting the IDS

Why would you need to use a proxy to perform scanning? A. To enhance anonymity B. To fool firewalls C. Perform half-open scans D. To perform full-open scans

A. To enhance anonymity

Using Nmap, what is the correct command to scan a target subnet of 192.168.0.0/24 using a ping sweep and identifying the operating system? A. nmap -sP -O 192.168.0.0/24 B. nmap -sP -V 192.168.0.0/24 C. nmap -sT -P 192.168.0.0/24 D. nmap -Ps -O 192.168.0.0/24

A. nmap -sP -O 192.168.0.0/24

What is missing from a half-open scan? A. SYN B. ACK C. SYN-ACK D. FIN

B. ACK

What is war dialing? A. An adversary conducting a DoS on a modem B. An adversary dialing to see what modems are open C. An adversary using a modem as an evil twin D. An adversary verifying closed modems

B. An adversary dialing to see what modems are open

A vulnerability scan is a good way to do what? A. Find open ports B. Find weaknesses C. Find operating systems D. Identify hardware

B. Find weaknesses

Which of the following types of attack has no flags set? A. SYN B. NULL C. Xmas tree D. FIN

B. NULL

During a Xmas tree scan what indicates a port is closed? A. No return response B. RST C. ACK D. SYN

B. RST

During an FIN scan, what indicates that a port is closed? A. No return response B. RST C. ACK D. SYN

B. RST

What is Tor used for? A. To hide web browsing B. To hide the process of scanning C. To automate scanning D. To hide the banner on a system

B. To hide the process of scanning

Which switch in Nmap allows the user to perform a fast scan? A. -oX B. -PT C. -T4 D. -sS

C. -T4

What is the maximum byte size for a TCP packet? (i.e. MTU- Maximum transmission unit) A. 65,535 B. 65,507 C. 1,500 D. 65,527

C. 1,500

A full-open scan means that the three-way handshake has been completed. What is the difference between this and a half-open scan? A. A half-open uses TCP. B. A half-open uses UDP. C. A half-open does not include the final ACK. D. A half-open includes the final ACK.

C. A half-open does not include the final ACK.

When trying to identify all the workstations on a subnet, what method might you choose? A. Port scan B. Anonymizer C. Ping sweep D. Web crawler

C. Ping sweep

A hacker is conducting the following on the target workstation: nmap -sT 192.33.10.5. The attacker is in which phase? A. Covering tracks B. Enumeration C. Scanning and enumeration D. Gaining access

C. Scanning and enumeration

Using Nmap, which switch command enables a UDP connections scan of a host? A. -sS B. -sX C. -PT D. -sU

D. -sU

Which best describes a vulnerability scan? A. A way to find open ports B. A way to diagram a network C. A proxy attack D. A way to automate the discovery of weaknesses.

D. A way to automate the discovery of weaknesses.

What would be the purpose of running a ping sweep? A. You want to identify responsive hosts without a port scan. B. You want to use something that is light on network traffic. C. You want to use a protocol that may be allowed through the firewall. D. All of the above.

D. All of the above.

Which of the following is not a flag on a packet? A. URG B. PSH C. RST D. END

D. END

A banner can do what? A. Identify an OS B. Help during scanning C. Identify weaknesses D. Identify a service

D. Identify a service

What protocol would you use to conduct banner grabbing? A. FTP B. IRC C. DNS D. Telnet

D. Telnet

Which of the following is used to perform customized network scans? A. Nessus B. Wireshark C. AirPcap D. nmap

D. nmap


संबंधित स्टडी सेट्स

AP CSP Chapter 15, 16, & 17 Study Guide

View Set

Economics Unit 1 Lesson 2 Part 3

View Set

Saunders Chapter 65: Crisis Theory and Interventions

View Set

Chapter 10 Network Segmentation and Virtualization

View Set

Chapter 1 The profession of Nursing

View Set

Chapter 6-10 Networking Exam Answers

View Set

The Study of Minorities (chap 1) #36-70

View Set

Maryland Property & Casualty Insurance Practice Questions

View Set