Exam 5: Port Scanning

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If an attacker decides to implement a less obvious port-scan,or stealth attack,which of the following techniques would be appropriate to make their activities more difficult to detect?

(Multiple Choice)
4.9/5
(33)

Closed ports respond to a NULL scan with what type of packet?

(Multiple Choice)
4.7/5
(37)

Nmap has a GUI front end that makes it easier to work with some of the complex options by providing a GUI.Which of the following is the Nmap GUI front end?

(Multiple Choice)
4.8/5
(31)

What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?

(Multiple Choice)
4.8/5
(33)

When writing a script which statement allows you to avoid creating an endless loop in your script?

(Multiple Choice)
4.7/5
(40)

An open port allows access to specific applications and cannot be vulnerable to attack.

(True/False)
4.8/5
(35)

When a TCP three-way handshake ends,both parties send what type of packet to end the connection?

(Multiple Choice)
4.8/5
(43)

When using the text editor vim what command appends text after the insertion point?

(Multiple Choice)
4.8/5
(48)

What type of port scan has the FIN,PSH,and URG flags set?

(Multiple Choice)
4.7/5
(37)

In a Linux script,which of the lines is important because it identifies the file as a script?

(Multiple Choice)
4.9/5
(41)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)