Exam 5: Port Scanning
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
When a TCP three-way handshake ends, both parties send a(n) ____ packet to end the connection.
Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
C
MATCHING
Match each term with the correct statement below.
-a port scanning tool
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
A
MATCHING
Match each term with the correct statement below.
-allows access to applications
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
H
Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks, so they use ____________________ attacks that are more difficult to detect.
(Short Answer)
4.9/5
(30)
With the ____ tool, you can ping multiple IP addresses simultaneously.
(Multiple Choice)
4.9/5
(36)
Port scanners can also be used to conduct a(n) ____________________ of a large network to identify which IP addresses belong to active hosts.
(Short Answer)
4.9/5
(36)
Why is port scanning considered legal by most security testers and hackers?
(Essay)
4.7/5
(31)
MATCHING
Match each term with the correct statement below.
-similar to the SYN scan, except that it does complete the three-way handshake
(Multiple Choice)
4.9/5
(37)
You can search for known vulnerabilities in a host computer by using the Common Vulnerabilities and Exposures Web site.
(True/False)
4.8/5
(41)
In a Linux script, the line ____ is important because it identifies the file as a script.
(Multiple Choice)
4.9/5
(40)
Nmap has a GUI version called ____________________ that makes it easier to work with some of the more complex options.
(Short Answer)
4.9/5
(36)
A disadvantage of Nmap is that it is very slow because it scans all the 65,000 ports of each computer in the IP address range.
(True/False)
4.8/5
(36)
The ____ tool enables you to craft an IP packet to your liking.
(Multiple Choice)
5.0/5
(41)
____, an open-source fork of Nessus, functions much like a database server, performing complex queries while the client interfaces with the server to simplify reporting and configuration.
(Multiple Choice)
4.9/5
(37)
What are the problems on depending on ping sweeps to find out which hosts are "live"?
(Essay)
4.8/5
(33)
A ____ or batch file is a text file containing multiple commands that are normally entered manually at the command prompt.
(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)