Exam 5: Port Scanning
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to ____________________ the range of IP addresses.
(Short Answer)
4.9/5
(35)
____ is a reasonably priced commercial port scanner with a GUI interface.
(Multiple Choice)
4.8/5
(31)
The ____ tool was originally written for Phrack magazine in 1997 by Fyodor.
(Multiple Choice)
4.8/5
(36)
Port scanning is a method of finding out which services a host computer offers.
(True/False)
4.7/5
(37)
MATCHING
Match each term with the correct statement below.
-in this type of scan, the FIN, PSH, and URG flags are set
(Multiple Choice)
4.8/5
(36)
MATCHING
Match each term with the correct statement below.
-does not allow entry or access to a service
(Multiple Choice)
4.8/5
(33)
____ is currently the standard port-scanning tool for security professionals.
(Multiple Choice)
4.9/5
(36)
MATCHING
Match each term with the correct statement below.
-might indicate that a firewall is being used
(Multiple Choice)
4.8/5
(34)
In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be "____".
(Multiple Choice)
4.9/5
(32)
Why is it important for you as a security tester to understand and be able to create scripts?
(Essay)
4.9/5
(28)
Which ports should security professionals scan when doing a test? Why?
(Essay)
4.7/5
(36)
What makes the ____________________ tool unique is the ability to update security check plug-ins when they become available.
(Short Answer)
4.9/5
(38)
MATCHING
Match each term with the correct statement below.
-operates on ports 65301, 22, 5631, and 5632
(Multiple Choice)
4.8/5
(45)
MATCHING
Match each term with the correct statement below.
-TCP scan with all the packet flags are turned off
(Multiple Choice)
4.8/5
(31)
An OpenVAS____________________ is a security test program (script) that can be selected from the client interface.
(Short Answer)
4.9/5
(29)
A closed port responds to a SYN scan with an RST packet, so if no packet is received, the best guess is that the port is open.
(True/False)
4.9/5
(36)
Many security testers use the ____ tool to bypass filtering devices by injecting modified IP packets.
(Multiple Choice)
4.7/5
(28)
____ was developed to assist security testers in conducting tests on large networks and to consolidate many of the tools needed for large-scale endeavors.
(Multiple Choice)
4.9/5
(34)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)