Security+ Section 11.2.9 Quiz

Ace your homework & exams now with Quizwiz!

You want to use a tool to scan a system for vulnerabilities, including open ports, running services, and missing patches. Which tool should you use? Wireshark LC4 Nessus OVAL

Nessus - A vulnerability scanner is a software program that searches an application, computer, or network for weaknesses. These weaknesses could be things such as open ports, running applications or services, missing critical patches, default user accounts that have not been disabled, and default or blank passwords. Vulnerability scanning tools include Nessus, Retina Vulnerability Assessment Scanner, and Microsoft Baseline Security Analyzer (MBSA).

You want to identify all devices on a network along with a list of open ports on those devices. You want the results displayed in a graphical diagram. Which tool should you use? Port scanner Ping scanner OVAL Network mapper

Network mapper - A network mapper is a tool that can discover devices on a network and show those devices in a graphical representation. Network mappers typically use a ping scan to discover devices and a port scanner to identify open ports on those devices.

Gathering as much personally identifiable information (PII) on a target as possible is a goal of which reconnaissance method? Passive Packet sniffing Active OSINT

OSINT - Open-source intelligence is any data that is collected from publicly available sources. The goal is to gather as much personally identifiable information (PII) as possible on the target. Dumpster diving is when an attacker goes through the trash to find important information that may have accidentally been thrown away. Active reconnaissance is the process of gathering information by interacting with the target in some manner. Packet sniffing is the process of capturing data packets that are flowing across a network and analyzing them for important information.

Which type of reconnaissance is dumpster diving? Passive OSINT Active Packet sniffing

Passive - Dumpster diving is when an attacker goes through the trash to find important information that may have accidentally been thrown away. Because there is no direct interaction with the target, dumpster diving is a form of passive reconnaissance. Active reconnaissance is the process of gathering information by interacting with the target in some manner. Dumpster diving does not fall under this category.

Which of the following tools can be used to see if a target has any online IoT devices without proper security? Shodan theHarvester scanless Packet sniffing

Shodan - Shodan is a popular search engine for internet-connected devices. Users can search for specific types of devices and locations. This information can be used to see if a target has any online devices without proper security.

The process of walking around an office building with an 802.11 signal detector is known as: Driver signing War driving Daemon dialing War dialing

War driving - War driving is the act of searching for wireless networks (802.11) using a signal detector or a network client (such as a PDA or notebook). While the phrase war driving originated from the action of driving around a city searching for wireless networks, the name currently applies to any method of searching for wireless networks, including walking around.

Which of the following tools can be used to view and modify DNS server information in Linux? tracert route netstat dig

dig - The dig command is used to view and modify DNS settings. These tools can be used to look up DNS server information and give IP addresses and domain names for a network server. The tracert command shows the path a packet takes to reach its destination. This is not the best tool for checking connectivity between two network devices. The route command is used in both Windows and Linux to show the routing table and to make manual changes to it. The netstat command is used to display a variety of network statistics in both Windows and Linux. This command is not used to look up DNS server information.

You need to enumerate the devices on your network and display the network's configuration details. Which of the following utilities should you use? nmap scanless dnsenum nslookup

nmap - The nmap utility is an open-source security scanner used for network enumeration and the creation of network maps. Use nmap to send specially crafted packets to a target host and then analyze the responses to create a map. The scanless utility is used for port scanning. The dnsenum utility is a program that performs DNS enumeration and can find the DNS servers and entries for an organization. Use nslookup to submit name resolution requests to identify DNS name servers and IP addresses for hosts.

You need to check network connectivity from your computer to a remote computer. Which of the following tools would be the BEST option to use? tracert ping nmap route

ping - The ping command is used to perform a connection test between two network devices. It works by sending ICMP packets to a specified device on a network and waiting for a response. This shows if there is a connection issue or not. The tracert command shows the path a packet takes to reach its destination. This is not the best tool to check for connectivity between two network devices. The nmap utility is a network security scanner. Use nmap to scan an entire network or specific IP addresses to discover all sorts of information. This is not the best tool to check for connectivity between two network devices. The route command is used in both Windows and Linux to show the routing table and to make manual changes to it.

Which passive reconnaissance tool is used to gather information from a variety of public sources? Shodan scanless theHarvester Packet sniffing

theHarvester - theHarvester is a passive reconnaissance tool that is used to gather information from a variety of public sources. This tool gathers emails, names, subdomains, IPs, and URLs using multiple public data sources. These include search engines, social media sites, and Shodan.


Related study sets

Chapter 3 Cells and Methods to Observe Them

View Set

Hash Algorithms and Encryption Methods

View Set

Psych Ch. 32 Issues Related to Human Sexuality & Gender Dysphoria

View Set

Chapter 46: Management of Patients with Metabolic Disorders

View Set