Ethical Hacking Chapter 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In a Linux script, which of the lines in important because it identifies the file as a script?

#!/bin/sh

When using the text editor vim what command appends text after the insertion point?

A

What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer's OS?

Connect

Which vi command deletes the current line?

Dd

When a TCP three-way handshake endsm both parties send what type of packet to end the connection?

FIN

An open port allows access to specific applications and cannot be vulnerable to attack.

False

In a NULL scan, all packet flags are turned on.

False

Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux

Fping

What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?

Fping

Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP- packets

Hping

What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?

Hping

What open port-scanning tool is considered to be the standard port-scanning tool for security professionals?

NMap

The original utility from which OpenVas was developed

Nessus

A popular Port scanners that has the ability to use a GUI front end

Nmap

Nmap has a GUI front end that makes it easier to work some of the complex options by providing a GUI. Which of the following is the Nmap GUI front end?

Nmap GUI

What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?

OpenVAS

An open-source fork of Nessus

OpenVas

Closed ports respond to a NULL scan with what type of packet?

RST

In normal TCP session, the sender sends a packet to another computer with which of the following flags set?

SYN flag

Attackers typically use scans to get past a firewall or other filtering devices.

True

Port scanning is a method of finding out which services a host computer offers.

True

You can search for vulnerabilities in a host computer by using a port-scanning tool.

True

What type of port scan has the FIN, PHS, and URG flags set?

XMAS scan

In any *NIX system, after saving a script named "script_name," you need to make it executable so that you can run it. Which command will accomplish this task from the command line?

chmod+execute script_name

A port state which does not allow entry or access to a service

closed port

Which of the following describes a flexible program that automates a task that takes too much to perform manually?

customized script

Which statement is where the script performs its main task?

do

A port state that may indicate a firewall is being used to allow specified traffic into or out of the network

filtered port

When security professionals create a packet, they may choose to specifically set which of the following fields to help initiate a response from a target computer?

flag

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?

limit their scan speeds

A port state tht allows access to applications and can be vulnerable

open port

To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses?

ping

Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts

ping sweep

When using a port-scanner, what procedure can be conducted to identify which IP addresses belong to active hosts?

ping sweep

Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly

port scanning

One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?

reply

Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?

script

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

stealth

In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be operating in what state?

unfiltered

When writing a script which statement allows you to avoid creating an endless loop in your script?

while


Set pelajaran terkait

Math Unit 1 test/ chapter review

View Set

Health Assessment Prep U Chapter 1

View Set

Chapter 13 European History Terms

View Set

Pharmacology Ch 89 - Drug therapy for UTIs

View Set

Ultimate Quizlet Set: Eras 3-6 ALL THE QUIZLET TERMS BESIDES ERA 1/2

View Set