CEH Notes 02 Flashcards
Quiz: Which of the following techniques can be used to get banner information about a service?
A. Passive banner grabbing
B. TTL values
C. Aggressive scan
D. All of the above
Answer: A. Passive banner grabbing can extract banner information from network traffic, while TTL values and aggressive scans can be used for OS detection and version scanning.
Quiz: Which tool can be used for OS discovery by observing the TTL values?
A. Nmap
B. Unicornscan
C. Telnet
D. FTP
Answer: B. Unicornscan can guess the target OS by observing the TTL values.
Quiz: Which switch in Nmap can be used for OS discovery?
A. -sV
B. -sT
C. -O
D. -A
Answer: C. The -O switch in Nmap can be used for OS discovery.
What is the difference between active and passive banner grabbing?
A. Active banner grabbing sends traffic and analyzes responses, while passive banner grabbing just sniffs network traffic and tries to extract info from captured packets.
B. Active banner grabbing sniffs network traffic and tries to extract info from captured packets, while passive banner grabbing sends traffic and analyzes responses.
C. Active banner grabbing is used for OS discovery, while passive banner grabbing is used for port scanning.
D. Passive banner grabbing is used for OS discovery, while active banner grabbing is used for port scanning.
Answer: A. Active banner grabbing sends traffic and analyzes responses, while passive banner grabbing just sniffs network traffic and tries to extract info from captured packets.
Explanation: Active banner grabbing sends traffic and waits for responses from target services, which are then analyzed to extract information such as service and OS version. Passive banner grabbing, on the other hand, does not send any traffic and instead just sniffs network traffic to extract the same information from packets captured.
Quiz: What is the typical TTL value for Windows and Linux systems?
A. Windows: 64, Linux: 128
B. Windows: 128, Linux: 64
C. Windows: 256, Linux: 128
D. Windows: 128, Linux: 256
Answer: B. Windows typically defaults to a TTL value of 128, while Linux systems often have a TTL value of 64.
Quiz: What is Unicornscan used for in terms of OS discovery?
A. It guesses the target OS’s based on TCP flags.
B. It guesses the target OS’s based on network traffic sniffing.
C. It guesses the target OS’s based on TTL values.
D. It guesses the target OS’s based on active scans.
Answer: C. It guesses the target OS’s based on TTL values.
Quiz: Which of the following switches is used for OS discovery in Nmap?
A. -sV
B. -sS
C. -O
D. -A
Answer: C. -O
Explanation: The -O switch in Nmap is used for OS discovery. It allows Nmap to determine the operating system running on the target host based on various characteristics, such as TTL values and fingerprinting.
Which of the following is true about the Nmap aggressive scan (-A)?
A. It only does OS detection (-O)
B. It includes script scanning with several scripts (-sC)
C. It excludes version scanning (-sV)
D. It’s a silent and stealthy scan
Answer: B. It includes script scanning with several scripts (-sC).
Explanation: The Nmap aggressive scan (-A) is a very “noisy” scan that includes OS detection (-O), version scanning (-sV), script scanning with several scripts (-sC), and a traceroute (–traceroute). It is not a silent and stealthy scan, as it sends a lot of traffic and is meant to be a comprehensive scan. The “http-methods” script scans a webserver to see which HTTP methods are enabled, and the “ftp-anon” script checks if an FTP server allows anonymous logins.
Quiz: What is the purpose of Nmap timing templates?
A. To control the speed of Nmap scans.
B. To determine the operating system of a target.
C. To perform banner grabbing on FTP, Telnet, and HTTP services.
D. To scan for open ports on a target.
Answer: A. To control the speed of Nmap scans.
Quiz: What is the default timing template for Nmap scans?
A. -T0
B. -T3
C. -T4
D. -T5
Answer: B. -T3
Quiz: Which Nmap timing template is recommended for modern networks?
A. -T0
B. -T3
C. -T4
D. -T5
Answer: C. -T4
Quiz: What is the purpose of using decoys in Nmap scans?
A. To speed up the scanning process
B. To disguise the attacker’s IP address
C. To generate false positive results
D. To block the target’s network traffic
Answer: B. To disguise the attacker’s IP address.
Explanation: Decoys are used in Nmap scans to make it difficult for security staff to identify the true attacker by generating fake IP addresses that appear to have performed the port scan along with the attacker’s real IP address. This can be useful for attackers who want to remain anonymous and avoid detection.
What option do you use to export Nmap scan results to an XML file?
A. -oR
B. -oN
C. -oG
D. -oX
Answer: D. -oX
Explanation: The -oX option is used to export Nmap scan results to an XML file. This file can then be imported into many programs for viewing or converted into HTML for easy viewing with a web browser.
Quiz 2:
What is the purpose of Hping?
A. To generate decoy port scans
B. To import Nmap scan results to an XML file
C. To analyze banner information
D. To craft packets and perform manual port scans
Answer: D. To craft packets and perform manual port scans
Explanation: Hping is a command-line based packet crafting utility that can be used to craft packets and perform manual port scans.
Quiz 3:
What is the default protocol used by Hping?
A. UDP
B. ICMP
C. TCP
D. FTP
Answer: C. TCP
Explanation: By default, Hping uses TCP.
Quiz 4:
What is the purpose of the -oX option in Nmap?
A. To generate decoy port scans
B. To analyze banner information
C. To control the speed of the scan
D. To export scan results to an XML file
Answer: D. To export scan results to an XML file
Explanation: The -oX option in Nmap is used to export scan results to an XML file.
Quiz 5:
What is the recommended timing template for modern networks in Nmap?
A. -T0
B. -T3
C. -T4
D. -T5
Answer: C. -T4
Explanation: The recommended timing template for modern networks in Nmap is -T4.
Quiz 6:
What is the purpose of using decoys in Nmap?
A. To generate decoy port scans
B. To analyze banner information
C. To control the speed of the scan
D. To make it difficult to determine the actual attacker in log files
Answer: D. To make it difficult to determine the actual attacker in log files
Explanation: The purpose of using decoys in Nmap is to make it difficult to determine the actual attacker in log files.
What is the purpose of the NetBIOS protocol?
A. To broadcast names to the network
B. To encrypt network traffic
C. To provide remote access to networks
D. To filter network traffic
Answer: A. To broadcast names to the network.
Which command-line Windows command can be used to list domains, computers, and shares?
A. ping
B. nslookup
C. net view
D. dir
Answer: C. net view.
What does LNMIB2.MIB contain?
A. Object types for workstations and server services
B. SNMP server configuration settings
C. Network topology diagrams
D. LDAP user and computer names
Answer: A. Object types for workstations and server services.
What is Jxplorer?
A. A protocol for enumerating users and computers
B. A free client for browsing LDAP servers
C. A tool for querying DNS records
D. A command-line utility for enumerating SMTP accounts
Answer: B. A free client for browsing LDAP servers.
How can the vrfy command be used to enumerate user accounts on a mail server?
A. By testing user accounts
B. By encrypting network traffic
C. By listing domains, computers, and shares
D. By dumping DNS records for the domain
Answer: A. By testing user accounts.
What command can be used from Linux to perform DNS queries?
A. ping
B. dig
C. traceroute
D. netstat
Answer: B. dig.
What option can be used with the NSLOOKUP command to “dump” the records for the domain (zone-transfer) onto the screen?
A. -d
B. -t
C. -a
D. -xfr
Answer: A. -d.
What Linux command can be used to find the A record (IP to FQDN) of a domain?
A. ping
B. traceroute
C. netstat
D. host
Answer: D. host.
What is the purpose of DNS cache snooping?
A. To forward DNS queries to a DNS server
B. To prevent unauthorized access to DNS records
C. To find out if a device knows the answer to a DNS query
D. To encrypt DNS traffic
Answer: C. To find out if a device knows the answer to a DNS query.
What is the purpose of the -norecursive switch in an nslookup query?
A. To forward the query to a DNS server
B. To prevent unauthorized access to DNS records
C. To see if the device itself knows the answer to the DNS query
D. To encrypt DNS traffic
Answer: C. To see if the device itself knows the answer to the DNS query.
What is the purpose of the -oX option in an nmap scan?
A. To control the speed of the scan
B. To generate decoy port scans
C. To export the scan results to an XML file
D. To guess the target OS’s by observing the TTL values
Answer: C. To export the scan results to an XML file.
What is hping?
A. A protocol for enumerating users and computers
B. A tool for querying DNS records
C. A command-line based packet crafting utility
D. A tool for enumerating SMTP accounts
Answer: C. A command-line based packet crafting utility.
Quiz 1: What is the purpose of vuln scanners?
A. To fix vulnerabilities on a system
B. To generate reports of vulnerabilities, compliance issues, and problems
C. To encrypt network protocols
D. To configure system settings
Answer: B. To generate reports of vulnerabilities, compliance issues, and problems.
Quiz 2: Which of the following is an example of a vulnerability that can be detected by a vuln scanner?
A. A firewall rule
B. A printer’s paper jam
C. A weak password
D. A network cable unplugged
Answer: C. A weak password.
Quiz 3: What is the CVSS score for vulnerabilities that are rated as “Critical”?
A. 0.0
B. 4.0-6.9
C. 7.0-8.9
D. 9.0-10.0
Answer: D. 9.0-10.0.
Quiz 4: What does CVSS stand for?
A. Common Vulnerability Scoring System
B. Configuration and Vulnerability Scoring System
C. Compliance and Vulnerability Scoring System
D. Cybersecurity and Vulnerability Scoring System
Answer: A. Common Vulnerability Scoring System.
Quiz 5: Can a vuln scanner fix the vulnerabilities it detects?
A. Yes
B. No
Answer: B. No.
Quiz 6: What types of vulnerabilities can a vuln scanner detect?
A. Hardware issues
B. Physical security issues
C. Compliance issues
D. Software vulnerabilities
Answer: D. Software vulnerabilities.
Quiz 1: What is the score range for vulnerabilities classified as “Critical” in the Common Vulnerability Scoring System (CVSS)?
A. 4.0-6.9
B. 7.0-8.9
C. 9.0-10.0
D. 0.1-3.9
Answer: C. 9.0-10.0.
Quiz 2: What is the score range for vulnerabilities classified as “High” in the Common Vulnerability Scoring System (CVSS)?
A. 4.0-6.9
B. 7.0-8.9
C. 9.0-10.0
D. 0.1-3.9
Answer: B. 7.0-8.9.
Quiz 3: What is the score range for vulnerabilities classified as “Medium” in the Common Vulnerability Scoring System (CVSS)?
A. 4.0-6.9
B. 7.0-8.9
C. 9.0-10.0
D. 0.1-3.9
Answer: A. 4.0-6.9.