Deck 3: Scanning Tools

Full screen (f)
exit full mode
Question
Scanners were originally developed to aid security professionals and system administrators in examining networks for security vulnerabilities.
Use Space or
up arrow
down arrow
to flip the card.
Question
In the early 1980s, the majority of servers ran on Windows platforms.
Question
A user needs root privileges to perform TCP connect scanning.
Question
Nessus is a remote security scanner designed to be run on Linux, BSD, Solaris, and other versions of UNIX.
Question
SARA was designed to complement and interface with other security tools, such as Nmap.
Question
____, the precursor to the Internet, appeared in ____.

A)UNIX, 1975
B)ARPANET, 1969
C)TCP, 1986
D)UDP, 1993
Question
A ____ is a script that tells the modem to dial a range of phone numbers defined by the user, and then identifies those numbers that connect to remote computers.

A)modem
B)firewall
C)router
D)war dialer
Question
In ____, the target host transmits connection-succeeded messages for active ports and host-unreachable messages for inactive ports.

A)UDP scanning
B)ping scanning
C)TCP connect scanning
D)IP protocol scanning
Question
A(n) ____ scan demonstrates whether a remote host is active by sending ICMP echo request packets to that host.

A)IP protocol
B)ping
C)UDP
D)TCP connect
Question
____ is a third-generation network security analysis tool developed by Advanced Research Corporation

A)Cheops
B)Strobe
C)SAINT
D)SARA
Question
____________________ is a software tool that examines and reports about vulnerabilities on local and remote hosts.
Question
____________________ examines and reports upon the condition (open or closed) of a port as well as the application listening on that port, if possible.
Question
____________________ scanning is TCP connection scanning, but it does not complete the connections.
Question
NmapFE is an nmap graphic interface for the ____________________ Linux Desktop.
Question
____________________ was developed by Alexandre Sagala and is a GUI for Nmap, to be used with the KDE desktop environment.
Question
How do scanners work?
Question
What are the most important types of scanning?
Question
How does IP protocol scanning work?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Scanning Tools
1
Scanners were originally developed to aid security professionals and system administrators in examining networks for security vulnerabilities.
True
2
In the early 1980s, the majority of servers ran on Windows platforms.
False
3
A user needs root privileges to perform TCP connect scanning.
False
4
Nessus is a remote security scanner designed to be run on Linux, BSD, Solaris, and other versions of UNIX.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
SARA was designed to complement and interface with other security tools, such as Nmap.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
____, the precursor to the Internet, appeared in ____.

A)UNIX, 1975
B)ARPANET, 1969
C)TCP, 1986
D)UDP, 1993
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
A ____ is a script that tells the modem to dial a range of phone numbers defined by the user, and then identifies those numbers that connect to remote computers.

A)modem
B)firewall
C)router
D)war dialer
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
In ____, the target host transmits connection-succeeded messages for active ports and host-unreachable messages for inactive ports.

A)UDP scanning
B)ping scanning
C)TCP connect scanning
D)IP protocol scanning
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
A(n) ____ scan demonstrates whether a remote host is active by sending ICMP echo request packets to that host.

A)IP protocol
B)ping
C)UDP
D)TCP connect
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
____ is a third-generation network security analysis tool developed by Advanced Research Corporation

A)Cheops
B)Strobe
C)SAINT
D)SARA
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
____________________ is a software tool that examines and reports about vulnerabilities on local and remote hosts.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ examines and reports upon the condition (open or closed) of a port as well as the application listening on that port, if possible.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
____________________ scanning is TCP connection scanning, but it does not complete the connections.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
NmapFE is an nmap graphic interface for the ____________________ Linux Desktop.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
____________________ was developed by Alexandre Sagala and is a GUI for Nmap, to be used with the KDE desktop environment.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
How do scanners work?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
What are the most important types of scanning?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
How does IP protocol scanning work?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.