Deck 3: Scanning Tools
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
Play
Full screen (f)
Deck 3: Scanning Tools
1
Scanners were originally developed to aid security professionals and system administrators in examining networks for security vulnerabilities.
True
2
In the early 1980s, the majority of servers ran on Windows platforms.
False
3
A user needs root privileges to perform TCP connect scanning.
False
4
Nessus is a remote security scanner designed to be run on Linux, BSD, Solaris, and other versions of UNIX.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
SARA was designed to complement and interface with other security tools, such as Nmap.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
____, the precursor to the Internet, appeared in ____.
A)UNIX, 1975
B)ARPANET, 1969
C)TCP, 1986
D)UDP, 1993
A)UNIX, 1975
B)ARPANET, 1969
C)TCP, 1986
D)UDP, 1993
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
A ____ is a script that tells the modem to dial a range of phone numbers defined by the user, and then identifies those numbers that connect to remote computers.
A)modem
B)firewall
C)router
D)war dialer
A)modem
B)firewall
C)router
D)war dialer
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
In ____, the target host transmits connection-succeeded messages for active ports and host-unreachable messages for inactive ports.
A)UDP scanning
B)ping scanning
C)TCP connect scanning
D)IP protocol scanning
A)UDP scanning
B)ping scanning
C)TCP connect scanning
D)IP protocol scanning
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
A(n) ____ scan demonstrates whether a remote host is active by sending ICMP echo request packets to that host.
A)IP protocol
B)ping
C)UDP
D)TCP connect
A)IP protocol
B)ping
C)UDP
D)TCP connect
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
____ is a third-generation network security analysis tool developed by Advanced Research Corporation
A)Cheops
B)Strobe
C)SAINT
D)SARA
A)Cheops
B)Strobe
C)SAINT
D)SARA
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
____________________ is a software tool that examines and reports about vulnerabilities on local and remote hosts.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ examines and reports upon the condition (open or closed) of a port as well as the application listening on that port, if possible.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
____________________ scanning is TCP connection scanning, but it does not complete the connections.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
NmapFE is an nmap graphic interface for the ____________________ Linux Desktop.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
____________________ was developed by Alexandre Sagala and is a GUI for Nmap, to be used with the KDE desktop environment.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
How do scanners work?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
What are the most important types of scanning?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
How does IP protocol scanning work?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck