Exam 5: Port Scanning
Why is it important for a security tester to be able to use Nmap?
Nmap has become one of the most popular port scanners and adds new features constantly,such as OS detection and fast multiple-probe ping scanning.Nmap also has a GUI front end called Zenmap that makes working with complex options easier.Nmap has been enhanced over the years because,like many other security tools,it's open source; if bugs are found,users can offer suggestions for correcting them.
How does a SYN scan work?
In a normal TCP session,a packet is sent to another computer with the SYN flag set.The receiving computer sends back a packet with the SYN/ACK flag set,indicating an acknowledgment.The sending computer then sends a packet with the ACK flag set.If the port to which the SYN packet is sent is closed,the computer responds to the SYN packet with an RST/ACK packet.If a SYN/ACK packet is received by an attacker's computer,it quickly responds with an RST/ACK packet,closing the session.This is done so that a full TCP connection is never made and logged as a transaction.In this sense,it is "stealthy." After all,you don't want a transaction to be logged showing the IP address that connected to the attacked computer.
What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?
B
You can search for vulnerabilities in a host computer by using a port-scanning tool.
Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?
Match each item with a statement below.
-A popular port scanners that has the ability to use a GUI front end
What are the problems with depending on ping sweeps to find out which hosts are "live"?
Match each item with a statement below.
-A port state which does not allow entry or access to a service
What network security tool,usually included with Kali Linux,allows a user to ping multiple IP addresses?
Match each item with a statement below.
-The original utility from which OpenVas was developed
Attackers typically use ACK scans to get past a firewall or other filtering devices.
When security professionals create a packet,they may choose to specifically set which of the following fields to help initiate a response from a target computer?
In a normal TCP session,the sender sends a packet to another computer with which of the following flags set?
Match each item with a statement below.
-A port state that allows access to applications and can be vulnerable
Match each item with a statement below.
-Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly
Match each item with a statement below.
-Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux
Why is it important for you as a security tester to understand and be able to create scripts?
Match each item with a statement below.
-Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)