5.1.10 Practice Questions Flashcards

1
Q

A technician is using a modem to dial a large block of phone numbers in an attempt to locate other systems connected to a modem. Which type of network scan is being used?

answer

Wardialing

Fingerprinting

Stealth

Ping sweep

A

Wardialing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ping sweep is used to scan a range of IP addresses to look for live systems. A ping sweep can also alert a security system, which could result in an alarm being triggered or an attempt being blocked. Which type of scan is being used?

answer

Vulnerability scan

Port scan

Network scan

Decoy scan

A

Network scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Randy is an ethical hacker student. He has learned how nmap flag manipulation can help find open ports. Although the name of the operating system did not jump right out at him, he might be able to figure it out by reviewing packet information. In a packet, Randy can see a TTL of 255 and a window size of 4128.

What type of scanning process is Randy using?

answer

Beyond Trust

Ping sweep

Wardialing

Fingerprinting

A

Fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Listen to exam instructions
Which of the following scans is used to actively engage a target in an attempt to gather information about it?

answer

Vulnerability scan

Port scan

TCP scan

Network scan

A

Port scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A hacker finds a target machine but wants to avoid getting caught, so the hacker finds another system to take the blame. This system is frequently called a zombie machine because it’s disposable and creates a good distraction.

Which of the following port scans is being used?

answer

Xmas tree scan

Full open scan

Idle scan

NULL scan

A

Idle scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Listen to exam instructions
Alex, a security specialist, is using an Xmas tree scan. Which of the following TCP flags will be sent back if the port is closed?

answer

FIN

URG

RST

ACK

A

RST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Listen to exam instructions
Which of the following flags is used by a TCP scan to direct the sending system to send buffered data?

answer

SYN

PSH

URG

FIN

A

PSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. Computer 1 sends a SYN packet to Computer 2. Which packet does Computer 2 send back?

answer

SYN/RST

ACK

SYN/ACK

RST

A

SYN/ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Listen to exam instructions
What type of scan is used to find system weaknesses such as open ports, access points, and other potential threats?

Vulnerability scan

Port scan

Decoy scan

Network scan

A

Vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are using an iOS device. You want to scan networks, websites, and ports to find open network devices. Which of the following network mapping tools should you use?

answer

NetAuditor

Scany

Network Topology Manager

Colasoft

A

Scany

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following packet crafting software programs can be used to modify flags and adjust other packet content?

answer

ping

Currports

IP Tools

Colasoft

A

Colasoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You want a list of all open UDP and TCP ports on your computer. You also want to know which process opened the port, which user created the process, and what time is was created. Which of the following scanning tools should you use?

answer

IP tools

Currports

Hping3

Angry IP scanner

A

Currports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Listen to exam instructions
Which of the following best describes the scan with ACK evasion method?

answer

Helps determine whether the firewall is stateful or stateless and whether or not the ports are open.

Sends packets and breaks them apart so intrusion detection systems don’t know what they are.

Returns feedback to the fake IP address and ensures there is no record of the IP address sending the requests.

Filters incoming and outgoing traffic, provides you with anonymity, and shields you from possible detection.

A

Helps determine whether the firewall is stateful or stateless and whether or not the ports are open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a benefit of using a proxy when you find that your scanning attempts are being blocked?

answer

The scan is sent to the recipient, the feedback is returned to the fake IP address, and then there is no record of your IP address sending the requests.

This scan will help you to determine whether the firewall is stateful or stateless and whether or not the ports are open.

It filters incoming and outgoing traffic, provides you with anonymity, and shields you from detection.

As long as you are not bombarding the system, the packet segments float by without concern.

A

It filters incoming and outgoing traffic, provides you with anonymity, and shields you from detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly