Exam 5: Port Scanning

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Why is it important for a security tester to be able to use Nmap?

Free
(Essay)
4.9/5
(31)
Correct Answer:
Verified

Nmap has become one of the most popular port scanners and adds new features constantly,such as OS detection and fast multiple-probe ping scanning.Nmap also has a GUI front end called Zenmap that makes working with complex options easier.Nmap has been enhanced over the years because,like many other security tools,it's open source; if bugs are found,users can offer suggestions for correcting them.

How does a SYN scan work?

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

In a normal TCP session,a packet is sent to another computer with the SYN flag set.The receiving computer sends back a packet with the SYN/ACK flag set,indicating an acknowledgment.The sending computer then sends a packet with the ACK flag set.If the port to which the SYN packet is sent is closed,the computer responds to the SYN packet with an RST/ACK packet.If a SYN/ACK packet is received by an attacker's computer,it quickly responds with an RST/ACK packet,closing the session.This is done so that a full TCP connection is never made and logged as a transaction.In this sense,it is "stealthy." After all,you don't want a transaction to be logged showing the IP address that connected to the attacked computer.

What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?

Free
(Multiple Choice)
4.7/5
(25)
Correct Answer:
Verified

B

Which statement is where the script performs its main task?

(Multiple Choice)
4.9/5
(34)

You can search for vulnerabilities in a host computer by using a port-scanning tool.

(True/False)
4.8/5
(36)

Which ports should security professionals scan when doing a test?

(Essay)
4.9/5
(33)

Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?

(Multiple Choice)
4.9/5
(38)

Match each item with a statement below. -A popular port scanners that has the ability to use a GUI front end

(Multiple Choice)
4.9/5
(37)

What are the problems with depending on ping sweeps to find out which hosts are "live"?

(Essay)
4.9/5
(33)

Match each item with a statement below. -A port state which does not allow entry or access to a service

(Multiple Choice)
4.9/5
(37)

What network security tool,usually included with Kali Linux,allows a user to ping multiple IP addresses?

(Multiple Choice)
4.7/5
(30)

Match each item with a statement below. -The original utility from which OpenVas was developed

(Multiple Choice)
4.9/5
(41)

Attackers typically use ACK scans to get past a firewall or other filtering devices.

(True/False)
4.9/5
(35)

When security professionals create a packet,they may choose to specifically set which of the following fields to help initiate a response from a target computer?

(Multiple Choice)
4.9/5
(37)

In a normal TCP session,the sender sends a packet to another computer with which of the following flags set?

(Multiple Choice)
4.9/5
(31)

Match each item with a statement below. -A port state that allows access to applications and can be vulnerable

(Multiple Choice)
4.9/5
(34)

Match each item with a statement below. -Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly

(Multiple Choice)
4.8/5
(36)

Match each item with a statement below. -Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux

(Multiple Choice)
4.8/5
(32)

Why is it important for you as a security tester to understand and be able to create scripts?

(Essay)
4.9/5
(34)

Match each item with a statement below. -Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)