Filters
Question type

Study Flashcards

What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?


A) NULL
B) NMap
C) NScanner
D) PortGhost

Correct Answer

verifed

verified

B

Which ports should security professionals scan when doing a test?

Correct Answer

verifed

verified

As a security tester,you need to know wh...

View Answer

Match each item with a statement below. -The original utility from which OpenVas was developed


A) Nmap
B) Fping
C) Hping
D) Nessus
E) closed port
F) OpenVAS
G) filtered port
H) open port
I) port scanning
J) ping sweep

Correct Answer

verifed

verified

What are the problems with depending on ping sweeps to find out which hosts are "live"?

Correct Answer

verifed

verified

To find out which hosts are "live," ping...

View Answer

Match each item with a statement below. -A popular port scanners that has the ability to use a GUI front end


A) Nmap
B) Fping
C) Hping
D) Nessus
E) closed port
F) OpenVAS
G) filtered port
H) open port
I) port scanning
J) ping sweep

Correct Answer

verifed

verified

Why is it important for a security tester to be able to use Nmap?

Correct Answer

verifed

verified

Nmap has become one of the most popular port scanners and adds new features constantly,such as OS detection and fast multiple-probe ping scanning.Nmap also has a GUI front end called Zenmap that makes working with complex options easier.Nmap has been enhanced over the years because,like many other security tools,it's open source; if bugs are found,users can offer suggestions for correcting them.

When security professionals create a packet,they may choose to specifically set which of the following fields to help initiate a response from a target computer?


A) box
B) flag
C) open
D) id

Correct Answer

verifed

verified

Why is it important for you as a security tester to understand and be able to create scripts?

Correct Answer

verifed

verified

Some tools might need to be modified to ...

View Answer

Match each item with a statement below. -A port state that allows access to applications and can be vulnerable


A) Nmap
B) Fping
C) Hping
D) Nessus
E) closed port
F) OpenVAS
G) filtered port
H) open port
I) port scanning
J) ping sweep

Correct Answer

verifed

verified

You can search for vulnerabilities in a host computer by using a port-scanning tool.

Correct Answer

verifed

verified

Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?


A) script
B) port-scanner
C) application
D) configuration file

Correct Answer

verifed

verified

Which statement is where the script performs its main task?


A) do
B) while
C) count
D) bin

Correct Answer

verifed

verified

Match each item with a statement below. -Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets


A) Nmap
B) Fping
C) Hping
D) Nessus
E) closed port
F) OpenVAS
G) filtered port
H) open port
I) port scanning
J) ping sweep

Correct Answer

verifed

verified

How does a SYN scan work?

Correct Answer

verifed

verified

In a normal TCP session,a packet is sent to another computer with the SYN flag set.The receiving computer sends back a packet with the SYN/ACK flag set,indicating an acknowledgment.The sending computer then sends a packet with the ACK flag set.If the port to which the SYN packet is sent is closed,the computer responds to the SYN packet with an RST/ACK packet.If a SYN/ACK packet is received by an attacker's computer,it quickly responds with an RST/ACK packet,closing the session.This is done so that a full TCP connection is never made and logged as a transaction.In this sense,it is "stealthy." After all,you don't want a transaction to be logged showing the IP address that connected to the attacked computer.

Match each item with a statement below. -A port state which does not allow entry or access to a service


A) Nmap
B) Fping
C) Hping
D) Nessus
E) closed port
F) OpenVAS
G) filtered port
H) open port
I) port scanning
J) ping sweep

Correct Answer

verifed

verified

In a normal TCP session,the sender sends a packet to another computer with which of the following flags set?


A) SYN/ACK flag
B) SYN flag
C) No flag
D) Reset flag

Correct Answer

verifed

verified

Match each item with a statement below. -Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly


A) Nmap
B) Fping
C) Hping
D) Nessus
E) closed port
F) OpenVAS
G) filtered port
H) open port
I) port scanning
J) ping sweep

Correct Answer

verifed

verified

Match each item with a statement below. -Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux


A) Nmap
B) Fping
C) Hping
D) Nessus
E) closed port
F) OpenVAS
G) filtered port
H) open port
I) port scanning
J) ping sweep

Correct Answer

verifed

verified

Attackers typically use ACK scans to get past a firewall or other filtering devices.

Correct Answer

verifed

verified

What network security tool,usually included with Kali Linux,allows a user to ping multiple IP addresses?


A) Nmap
B) Fping
C) Tcpdump
D) Nessus

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer