Ethical Hacking Chapter 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A FIN packet sent to a closed port responds with which of the following packets?

RST

Which type of scan is usually used to bypass a firewall or packet-filtering device?

ACK scan

To bypass some ICMP-filtering devices on a network, an attacker might send which type of packets to scan the network for vulnerable services? (Choose all that apply.)

SYN packets ACK packets

Which flags are set on a packet sent with the nmap -sX 193.145.85.202 command? (Choose all that apply.)

FIN PSH URG

What is a potential mistake when performing a ping sweep on a network?

Including a broadcast address in the ping sweep range

Security testers and hackers use which of the following to determine the services running on a host and the vulnerabilities associated with these services?

Port scanning

To find extensive Nmap information and examples of the correct syntax to use in Linux, which of the following commands should you type?

man nmap

Which of the following Nmap commands sends a SYN packet to a computer with the IP address 193.145.85.210? (Choose all that apply.)

nmap -sS 193.145.85.210 nmap -v 193.145.85.210

Why does the fping -f 193.145.85.201 193.145.85.220 command cause an error?

An incorrect parameter is used.

Fping doesn't allow pinging multiple IP addresses simultaneously. True or False?

False

Which Nmap command verifies whether the SSH port is open on any computers in the 192.168.1.0 network? (Choose all that apply.)

nmap -v 192.168.1.0-254 -p 22 nmap -v 192.168.1.0/24 -p 22

A closed port responds to a SYN packet with which of the following packets?

RST

Security testers can use Hping to bypass filtering devices. True or False?

True

A NULL scan requires setting the FIN, ACK, and URG flags. True or False?

False

Port scanning provides the state for all but which of the following ports?

Buffered

Which of the following is a tool for creating a custom TCP/IP packet and sending it to a host computer?

Hping

In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of packet to confirm that the host computer is live?

ICMP Echo Reply (type 0)

A(n) ________ scan sends a packet with all flags set to NULL.

NULL

What is the most widely used port-scanning tool?

Nmap

To see a brief summary of Nmap commands in a Linux shell, which of the following should you do?

Type nmap -h.


Set pelajaran terkait

Gastrointestinal System and Accessory Structures

View Set

Ch 8 Learnsmart Anxiety, Obsessive-Compulsive & Trauma3

View Set

Residential Sales Comparison and Income Approaches Ch 16

View Set

N117 Section 1 Exam NCLEX Practice Questions

View Set

CHAPTER 8 LESSON 3 Nonprofit Organizations

View Set