Exam 5: Port Scanning
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Match each item with a statement below.
-An open-source fork of Nessus
(Multiple Choice)
4.9/5
(40)
Match each item with a statement below.
-Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts
(Multiple Choice)
4.9/5
(29)
What open-source network utility allows you to use plug-ins to run test programs (scripts)that can be selected from the client interface?
(Multiple Choice)
4.8/5
(38)
What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer's OS?
(Multiple Choice)
4.9/5
(46)
Port scanning is a method of finding out which services a host computer offers.
(True/False)
4.8/5
(30)
One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests.What type of ICMP Echo message is being disabled by these administrators?
(Multiple Choice)
4.9/5
(41)
If subnetting is used in an organization,why should you be extra cautious when performing ping sweeps?
(Essay)
4.8/5
(38)
When using a port-scanner,what procedure can be conducted to identify which IP addresses belong to active hosts?
(Multiple Choice)
4.7/5
(29)
Explain why an attacker typically uses an ACK scan to bypass a firewall?
(Essay)
4.9/5
(37)
In an ACK scan,if the attacked port returns an RST packet the attacked port is considered to be operating in what state?
(Multiple Choice)
4.9/5
(32)
To verify if all the IP addresses of a network are being used by computers that are up and running,you can use a port scanner to perform what procedure on a range of IP addresses?
(Multiple Choice)
4.8/5
(32)
In any *NIX system,after saving a script named "script_name," you need to make it executable so that you can run it.Which command will accomplish this task from the command line?
(Multiple Choice)
4.8/5
(39)
Match each item with a statement below.
-A port state that may indicate a firewall is being used to allow specified traffic into or out of the network
(Multiple Choice)
4.8/5
(46)
Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks.Which of the following attacks are more difficult to detect?
(Multiple Choice)
4.8/5
(48)
Which of the following describes a flexible program that automates a task that takes too much time to perform manually?
(Multiple Choice)
5.0/5
(41)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)