HOD401 Chapter 5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

a

1. Which of the following is used for banner grabbing? A. Telnet B. FTP C. SSH D. Wireshark

a

10. What is the three-way handshake? A. The opening sequence of a TCP connection B. A type of half-open scan C. A Xmas tree scan D. Part of a UDP scan

c

11. A full-open scan means that the three-way handshake has been completed. What is the difference between this and a half-open scan? A. A half-open uses TCP. B. A half-open uses UDP. C. A half-open does not include the final ACK. D. A half-open includes the final ACK.

a

12. What is the sequence of the three-way handshake? A. SYN, SYN-ACK, ACK B. SYN, SYN-ACK C. SYN, ACK, SYN-ACK D. SYN, ACK, ACK

a

13. What is an ICMP echo scan? A. A ping sweep B. A SYN scan C. A Xmas tree scan D. Part of a UDP scan

d

14. Which best describes a vulnerability scan? A. A way to find open ports B. A way to diagram a network C. A proxy attack D. A way to automate the discovery of vulnerabilities

c

15. What is the purpose of a proxy? A. To assist in scanning B. To perform a scan C. To keep a scan hidden D. To automate the discovery of vulnerabilities

b

16. What is Tor used for? A. To hide web browsing B. To hide the process of scanning C. To automate scanning D. To hide the banner on a system

a

17. Why would you need to use a proxy to perform scanning? A. To enhance anonymity B. To fool firewalls C. Perform half-open scans D. To perform full-open scans

a

18. A vulnerability scan is a good way to do what? A. Find open ports B. Find weaknesses C. Find operating systems D. Identify hardware

d

19. A banner can do what? A. Identify an OS B. Help during scanning C. Identify weaknesses D. Identify a service

b

2. Which of the following is used for identifying a web server OS? A. Telnet B. Netcraft C. Fragroute D. Wireshark

a

20. nmap is required to perform what type of scan? A. Port scan B. Vulnerability scan C. Service scan D. Threat scan

d

3. Which of the following is used to perform customized network scans? A. Nessus B. Wireshark C. AirPcap D. nmap

d

4. Which of the following is not a flag on a packet? A. URG B. PSH C. RST D. END

a

5. An SYN attack uses which protocol? A. TCP B. UDP C. HTTP D. Telnet

b

6. Which of the following types of attack has no flags set? A. SYN B. NULL C. Xmas tree D. FIN

b

7. What is missing from a half-open scan? A. SYN B. ACK C. SYN-ACK D. FIN

b

8. During an FIN scan, what indicates that a port is closed? A. No return response B. RST C. ACK D. SYN

b

9. During a Xmas tree scan what indicates a port is closed? A. No return response B. RST C. ACK D. SYN


संबंधित स्टडी सेट्स

Business Ethics and Society Final Review

View Set

Chapter 43 Assessment and Management of Patients with Hepatic Disorders

View Set

Ch. 18: Performance and Discharge

View Set

Chapter 11: NV Statutes & Regulations Common to Life and Health Only

View Set