A) Ryan is inverse scanning a Windows host
B) Ryan is inverse scanning a Linux host
C) The filter is returning the RST flags to discourage the scan
D) The HTTP server always responds with a RST if the browser agent is not Mozilla or IE
Correct Answer
verified
Multiple Choice
A) The -sS scan looks for "Services" and this is not compatible with the -P0 (Do not ping first) option
B) He shouldn't run a dangerous scan like this as root, otherwise its OK
C) He is being thorough just as his boss asked him to. This range will be sure to notice everything.
D) He tried to scan 65536 ports on about 16 Million addresses. This is excessive traffic and is not a good approach.
Correct Answer
verified
Multiple Choice
A) Articles full of keywords but with dubious content value
B) Splurging on a burst of advertising on high cost, high impact traffic sites
C) Posting comments on trendy, spur of the moment type blog articles that have timely and up to the minute reporting
D) A network of connected sites that promote high click through actions. Example" "Click here" results in a sentence or two of promotion copy only to require yet another click to hopefully one day view some content.
Correct Answer
verified
Multiple Choice
A) LACNIC, LAPNIC, AFLAC
B) ARIN, LAPNIC, RIPE NCC
C) ARIN, APNIC, LAPNIC
D) ARIN, LACNIC, AfriNIC
Correct Answer
verified
Multiple Choice
A) S-1-5-7-341656734543-512
B) S-1-5-7-545632867586-1001
C) AD3424FDA31404EE
D) 1.2.1.1.1.2.1.3.1.4.6
Correct Answer
verified
Multiple Choice
A) SYN; SYN/ACK; ACK; RST
B) SYN; SYN/ACK; RST
C) SYN; SYN/ACK; FIN
D) SYN; SYN/ACK
Correct Answer
verified
Multiple Choice
A) netstats -an
B) netstat /an
C) nbtstat -an
D) nmap -sT -P0 -v [target ip]
Correct Answer
verified
Multiple Choice
A) Cheops
B) Queso
C) NMap
D) p0f
Correct Answer
verified
Multiple Choice
A) Telnet to the open port an grab a banner
B) Use a browser to view the web page
C) Use an FTP client to connect to port 80 and observe the error messages
D) View the source code of the index.html page
Correct Answer
verified
Multiple Choice
A) 2 Hours
B) 60 Minutes
C) 14 Days
D) 1 Week
Correct Answer
verified
Multiple Choice
A) smbclient -L [target ip]
B) nbtstat -L [target ip]
C) net view \ \[domain]
D) Linux doesn't support Windows file sharing, so Chris is wasting his time
Correct Answer
verified
Multiple Choice
A) An open port
B) Specific services like HTTP on the target since OS detection is basically a banner grab
C) A packet filtering firewall between the scanner and the target
D) One open port and one closed port
Correct Answer
verified
Multiple Choice
A) Use Google to locate Matt's script archive, guess on a popular script like formmail.pl, and use Google to look for vulnerabilities. Pop a code string into Google again and try to find vulnerable sites.
B) Use Google to search for webhosts that use these scripts and sign up for a free account. Download the scripts and analyze them for vulnerabilities.
C) These scripts are old and outdated. No one uses stuff like this anymore so Janet should ignore the article and move on.
D) Webhosts would not release vulnerable code, particularly the free services. They recognize their responsibility and invest a lot of money in ensuring the safety of their products. Janet has no angle here and should move on.
Correct Answer
verified
Multiple Choice
A) Google Earth
B) My IP Suite
C) Neotrace
D) Sam Spade
Correct Answer
verified
Multiple Choice
A) Lynx is a command line browser. We are passing in a URL that contains a search and dumping the results to a text file for further review.
B) Lynx is a command line browser and is extremely useful to the attacker that only has a remote shell on a system (no GUI) .
C) Lynx is a little known tool in the Google API. It provides access to undocumented functions and can access even Darknet data.
D) Lynx is an internal Linux command that tunnels an HTTP connection across a firewall and permits access to data anonymously. Since we do not want to be caught searching for a hacking class, this is the best tool to use.
Correct Answer
verified
Multiple Choice
A) Zone harvest
B) Zone Poison
C) Zone transfer
D) Zone estimate
Correct Answer
verified
Multiple Choice
A) Fred
B) Paul
C) Steve
D) Liz
Correct Answer
verified
Multiple Choice
A) netstat, pstools, nbtstat, procmon
B) top, netstat, lsof, ps
C) ps, top, nbstat, net use
D) rpcinfo, ldap, nbstat, ps
Correct Answer
verified
Multiple Choice
A) Send an email to a domain that will bounce back and analyze the headers
B) Telnet into port 25 and issue the VRFY command on names collected from the company directory
C) Embed a "web bug" in the HTML email and spam it out to everyone
D) All of the above
Correct Answer
verified
Multiple Choice
A) War dialing with Ettercap
B) War dialing with THC-Scan
C) Dialing for Dollars with Cold-Call Pro DX
D) Robo-dialing with DialDick.exe
Correct Answer
verified
Showing 1 - 20 of 65