Filters
Question type

Study Flashcards

When using a port-scanner,what procedure can be conducted to identify which IP addresses belong to active hosts?


A) ping sweep
B) ping check
C) network sweep
D) ICMP probing

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Match each item with a statement below. -Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts


A) Nmap
B) Fping
C) Hping
D) Nessus
E) closed port
F) OpenVAS
G) filtered port
H) open port
I) port scanning
J) ping sweep

K) F) and J)
L) E) and I)

Correct Answer

verifed

verified

Port scanning is a method of finding out which services a host computer offers.

A) True
B) False

Correct Answer

verifed

verified

To verify if all the IP addresses of a network are being used by computers that are up and running,you can use a port scanner to perform what procedure on a range of IP addresses?


A) ping
B) tracert
C) Nmap
D) port filtering

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Why is port scanning useful for hackers?

Correct Answer

verifed

verified

Port scanning helps you answer questions...

View Answer

If subnetting is used in an organization,why should you be extra cautious when performing ping sweeps?

Correct Answer

verifed

verified

If a ping sweep is activated inadvertent...

View Answer

In a NULL scan,all packet flags are turned on.

A) True
B) False

Correct Answer

verifed

verified

In an ACK scan,if the attacked port returns an RST packet the attacked port is considered to be operating in what state?


A) open
B) closed
C) unfiltered
D) unassigned

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following describes a flexible program that automates a task that takes too much time to perform manually?


A) Nmap
B) open source utility
C) customized script
D) Fping

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is a UDP scan?

Correct Answer

verifed

verified

In this type of scan,a UDP packet is sen...

View Answer

What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?


A) Uniscan
B) Fping
C) Nessus
D) OpenVAS

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which vi command deletes the current line?


A) D
B) dl
C) Dd
D) Dw

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Explain why an attacker typically uses an ACK scan to bypass a firewall?

Correct Answer

verifed

verified

ACK scan-Attackers typically use ACK sca...

View Answer

What makes the OpenVAS tool flexible and unique?

Correct Answer

verifed

verified

What makes this tool unique is the capab...

View Answer

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks.Which of the following attacks are more difficult to detect?


A) stealth
B) silent
C) planned
D) covert

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

In any *NIX system,after saving a script named "script_name," you need to make it executable so that you can run it.Which command will accomplish this task from the command line?


A) chmod +execute script_name
B) chmod +x script_name
C) chmod -execute script_name
D) chmod -x script_name

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer's OS?


A) XMAS
B) ACK
C) NULL
D) Connect

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Match each item with a statement below. -An open-source fork of Nessus


A) Nmap
B) Fping
C) Hping
D) Nessus
E) closed port
F) OpenVAS
G) filtered port
H) open port
I) port scanning
J) ping sweep

K) D) and I)
L) B) and F)

Correct Answer

verifed

verified

Match each item with a statement below. -A port state that may indicate a firewall is being used to allow specified traffic into or out of the network


A) Nmap
B) Fping
C) Hping
D) Nessus
E) closed port
F) OpenVAS
G) filtered port
H) open port
I) port scanning
J) ping sweep

K) B) and E)
L) A) and D)

Correct Answer

verifed

verified

One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests.What type of ICMP Echo message is being disabled by these administrators?


A) ping
B) test
C) acknowledge
D) reply

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer