Deck 5: Port Scanning

Full screen (f)
exit full mode
Question
Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?

A) script
B) port-scanner
C) application
D) configuration file
Use Space or
up arrow
down arrow
to flip the card.
Question
If an attacker decides to implement a less obvious port-scan,or stealth attack,which of the following techniques would be appropriate to make their activities more difficult to detect?

A) increase their scan speeds
B) limit their tool set
C) increase their scan speeds
D) limit their scan speeds
Question
Which of the following describes a flexible program that automates a task that takes too much time to perform manually?

A) Nmap
B) open source utility
C) customized script
D) Fping
Question
What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?

A) Hping
B) NetTools
C) Nessus
D) Nmap
Question
Attackers typically use ACK scans to get past a firewall or other filtering devices.
Question
When security professionals create a packet,they may choose to specifically set which of the following fields to help initiate a response from a target computer?

A) box
B) flag
C) open
D) id
Question
What open-source network utility allows you to use plug-ins to run test programs (scripts)that can be selected from the client interface?

A) Uniscan
B) Fping
C) Nessus
D) OpenVAS
Question
What type of port scan has the FIN,PSH,and URG flags set?

A) NULL scan
B) connect scan
C) XMAS scan
D) ACK scan
Question
An open port allows access to specific applications and cannot be vulnerable to attack.
Question
What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?

A) NULL
B) NMap
C) NScanner
D) PortGhost
Question
You can search for vulnerabilities in a host computer by using a port-scanning tool.
Question
What network security tool,usually included with Kali Linux,allows a user to ping multiple IP addresses?

A) Nmap
B) Fping
C) Tcpdump
D) Nessus
Question
Closed ports respond to a NULL scan with what type of packet?

A) RST
B) SYN
C) Ping
D) ACK
Question
In a normal TCP session,the sender sends a packet to another computer with which of the following flags set?

A) SYN/ACK flag
B) SYN flag
C) No flag
D) Reset flag
Question
In a NULL scan,all packet flags are turned on.
Question
Port scanning is a method of finding out which services a host computer offers.
Question
When a TCP three-way handshake ends,both parties send what type of packet to end the connection?

A) SYN
B) ACK
C) FIN
D) RST
Question
In an ACK scan,if the attacked port returns an RST packet the attacked port is considered to be operating in what state?

A) open
B) closed
C) unfiltered
D) unassigned
Question
What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer's OS?

A) XMAS
B) ACK
C) NULL
D) Connect
Question
When using a port-scanner,what procedure can be conducted to identify which IP addresses belong to active hosts?

A) ping sweep
B) ping check
C) network sweep
D) ICMP probing
Question
Nmap has a GUI front end that makes it easier to work with some of the complex options by providing a GUI.Which of the following is the Nmap GUI front end?

A) Nmap GUI
B) Fping
C) Zenmap
D) Hping
Question
In a Linux script,which of the lines is important because it identifies the file as a script?

A) #!/bin/sh
B) #!/bin/script
C) #!/bin/shscript
D) #!/bin/sc
Question
Explain why an attacker typically uses an ACK scan to bypass a firewall?
Question
Which statement is where the script performs its main task?

A) do
B) while
C) count
D) bin
Question
What makes the OpenVAS tool flexible and unique?
Question
When writing a script which statement allows you to avoid creating an endless loop in your script?

A) count
B) while
C) bin
D) do
Question
What is a UDP scan?
Question
Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks.Which of the following attacks are more difficult to detect?

A) stealth
B) silent
C) planned
D) covert
Question
Why is it important for a security tester to be able to use Nmap?
Question
How does a SYN scan work?
Question
If subnetting is used in an organization,why should you be extra cautious when performing ping sweeps?
Question
Which ports should security professionals scan when doing a test?
Question
To verify if all the IP addresses of a network are being used by computers that are up and running,you can use a port scanner to perform what procedure on a range of IP addresses?

A) ping
B) tracert
C) Nmap
D) port filtering
Question
Why is it important for you as a security tester to understand and be able to create scripts?
Question
In any *NIX system,after saving a script named "script_name," you need to make it executable so that you can run it.Which command will accomplish this task from the command line?

A) chmod +execute script_name
B) chmod +x script_name
C) chmod -execute script_name
D) chmod -x script_name
Question
Why is port scanning useful for hackers?
Question
One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests.What type of ICMP Echo message is being disabled by these administrators?

A) ping
B) test
C) acknowledge
D) reply
Question
Which vi command deletes the current line?

A) D
B) dl
C) Dd
D) Dw
Question
When using the text editor vim what command appends text after the insertion point?

A) X
B) A
C) Delete Key
D) ZZ
Question
What are the problems with depending on ping sweeps to find out which hosts are "live"?
Question
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
The original utility from which OpenVas was developed
Question
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
A port state that allows access to applications and can be vulnerable
Question
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux
Question
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
A port state which does not allow entry or access to a service
Question
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
A popular port scanners that has the ability to use a GUI front end
Question
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets
Question
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
An open-source fork of Nessus
Question
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts
Question
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
A port state that may indicate a firewall is being used to allow specified traffic into or out of the network
Question
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Port Scanning
1
Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?

A) script
B) port-scanner
C) application
D) configuration file
A
2
If an attacker decides to implement a less obvious port-scan,or stealth attack,which of the following techniques would be appropriate to make their activities more difficult to detect?

A) increase their scan speeds
B) limit their tool set
C) increase their scan speeds
D) limit their scan speeds
D
3
Which of the following describes a flexible program that automates a task that takes too much time to perform manually?

A) Nmap
B) open source utility
C) customized script
D) Fping
C
4
What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?

A) Hping
B) NetTools
C) Nessus
D) Nmap
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Attackers typically use ACK scans to get past a firewall or other filtering devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
When security professionals create a packet,they may choose to specifically set which of the following fields to help initiate a response from a target computer?

A) box
B) flag
C) open
D) id
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What open-source network utility allows you to use plug-ins to run test programs (scripts)that can be selected from the client interface?

A) Uniscan
B) Fping
C) Nessus
D) OpenVAS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
What type of port scan has the FIN,PSH,and URG flags set?

A) NULL scan
B) connect scan
C) XMAS scan
D) ACK scan
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
An open port allows access to specific applications and cannot be vulnerable to attack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?

A) NULL
B) NMap
C) NScanner
D) PortGhost
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
You can search for vulnerabilities in a host computer by using a port-scanning tool.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What network security tool,usually included with Kali Linux,allows a user to ping multiple IP addresses?

A) Nmap
B) Fping
C) Tcpdump
D) Nessus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Closed ports respond to a NULL scan with what type of packet?

A) RST
B) SYN
C) Ping
D) ACK
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
In a normal TCP session,the sender sends a packet to another computer with which of the following flags set?

A) SYN/ACK flag
B) SYN flag
C) No flag
D) Reset flag
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
In a NULL scan,all packet flags are turned on.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Port scanning is a method of finding out which services a host computer offers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
When a TCP three-way handshake ends,both parties send what type of packet to end the connection?

A) SYN
B) ACK
C) FIN
D) RST
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
In an ACK scan,if the attacked port returns an RST packet the attacked port is considered to be operating in what state?

A) open
B) closed
C) unfiltered
D) unassigned
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer's OS?

A) XMAS
B) ACK
C) NULL
D) Connect
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
When using a port-scanner,what procedure can be conducted to identify which IP addresses belong to active hosts?

A) ping sweep
B) ping check
C) network sweep
D) ICMP probing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Nmap has a GUI front end that makes it easier to work with some of the complex options by providing a GUI.Which of the following is the Nmap GUI front end?

A) Nmap GUI
B) Fping
C) Zenmap
D) Hping
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
In a Linux script,which of the lines is important because it identifies the file as a script?

A) #!/bin/sh
B) #!/bin/script
C) #!/bin/shscript
D) #!/bin/sc
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Explain why an attacker typically uses an ACK scan to bypass a firewall?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Which statement is where the script performs its main task?

A) do
B) while
C) count
D) bin
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
What makes the OpenVAS tool flexible and unique?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
When writing a script which statement allows you to avoid creating an endless loop in your script?

A) count
B) while
C) bin
D) do
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What is a UDP scan?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks.Which of the following attacks are more difficult to detect?

A) stealth
B) silent
C) planned
D) covert
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Why is it important for a security tester to be able to use Nmap?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
How does a SYN scan work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
If subnetting is used in an organization,why should you be extra cautious when performing ping sweeps?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Which ports should security professionals scan when doing a test?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
To verify if all the IP addresses of a network are being used by computers that are up and running,you can use a port scanner to perform what procedure on a range of IP addresses?

A) ping
B) tracert
C) Nmap
D) port filtering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Why is it important for you as a security tester to understand and be able to create scripts?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
In any *NIX system,after saving a script named "script_name," you need to make it executable so that you can run it.Which command will accomplish this task from the command line?

A) chmod +execute script_name
B) chmod +x script_name
C) chmod -execute script_name
D) chmod -x script_name
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Why is port scanning useful for hackers?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests.What type of ICMP Echo message is being disabled by these administrators?

A) ping
B) test
C) acknowledge
D) reply
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Which vi command deletes the current line?

A) D
B) dl
C) Dd
D) Dw
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
When using the text editor vim what command appends text after the insertion point?

A) X
B) A
C) Delete Key
D) ZZ
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What are the problems with depending on ping sweeps to find out which hosts are "live"?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
The original utility from which OpenVas was developed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
A port state that allows access to applications and can be vulnerable
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
A port state which does not allow entry or access to a service
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
A popular port scanners that has the ability to use a GUI front end
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
An open-source fork of Nessus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
A port state that may indicate a firewall is being used to allow specified traffic into or out of the network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Match each item with a statement below.a.Nmap
b.Fping
c.Hping
d.Nessus
e.closed port
f.OpenVAS
g.filtered port
h.open port
i.port scanning
j.ping sweep
Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.