Exam 5: Port Scanning

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Why is port scanning useful for hackers?

(Essay)
4.8/5
(41)

Match each item with a statement below. -An open-source fork of Nessus

(Multiple Choice)
4.9/5
(40)

Match each item with a statement below. -Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts

(Multiple Choice)
4.9/5
(29)

What open-source network utility allows you to use plug-ins to run test programs (scripts)that can be selected from the client interface?

(Multiple Choice)
4.8/5
(38)

What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer's OS?

(Multiple Choice)
4.9/5
(46)

Port scanning is a method of finding out which services a host computer offers.

(True/False)
4.8/5
(30)

What is a UDP scan?

(Essay)
4.8/5
(37)

One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests.What type of ICMP Echo message is being disabled by these administrators?

(Multiple Choice)
4.9/5
(41)

If subnetting is used in an organization,why should you be extra cautious when performing ping sweeps?

(Essay)
4.8/5
(38)

What makes the OpenVAS tool flexible and unique?

(Essay)
4.9/5
(28)

When using a port-scanner,what procedure can be conducted to identify which IP addresses belong to active hosts?

(Multiple Choice)
4.7/5
(29)

Explain why an attacker typically uses an ACK scan to bypass a firewall?

(Essay)
4.9/5
(37)

In an ACK scan,if the attacked port returns an RST packet the attacked port is considered to be operating in what state?

(Multiple Choice)
4.9/5
(32)

To verify if all the IP addresses of a network are being used by computers that are up and running,you can use a port scanner to perform what procedure on a range of IP addresses?

(Multiple Choice)
4.8/5
(32)

In any *NIX system,after saving a script named "script_name," you need to make it executable so that you can run it.Which command will accomplish this task from the command line?

(Multiple Choice)
4.8/5
(39)

Which vi command deletes the current line?

(Multiple Choice)
4.8/5
(34)

Match each item with a statement below. -A port state that may indicate a firewall is being used to allow specified traffic into or out of the network

(Multiple Choice)
4.8/5
(46)

Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks.Which of the following attacks are more difficult to detect?

(Multiple Choice)
4.8/5
(48)

Which of the following describes a flexible program that automates a task that takes too much time to perform manually?

(Multiple Choice)
5.0/5
(41)

In a NULL scan,all packet flags are turned on.

(True/False)
4.7/5
(30)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)