Chapter 15 – Security Assessment and Testing Flashcards

1
Q
  1. Which one of the following tools is used primarily to perform network discovery scans?
    Nmaps
A

Nmaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Adam recently ran a network port scan of a web server running in his organization. He ran the scan from an external network to get an attacker’s perspective on the scan. Which one of the following results is the greatest cause for alarm?
    1433/open
A

1433/open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which one of the following factors should not be taken into consideration when planning a security testing schedule for a particular system?
    Desire to experiment with new testing tools
A

Desire to experiment with new testing tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following is not normally included in a security assessment?
    Mitigation of vulnerabilities
A

Mitigation of vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Who is the intended audience for a security assessment report?
    Management
A

Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Beth would like to run an nmap scan against all of the systems on her organization’s private network. These include systems in the 10.0.0.0 private address space. She would like to scan this entire private address space because she is not certain what subnets are used. What network address should Beth specify as the target of her scan?
  2. 0.0.0/8
A

10.0.0.0/8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Alan ran an nmap scan against a server and determined that port 80 is open on the server. What tool would likely provide him the best additional information about the server’s purpose and the identity of the server’s operator?
    Web browser
A

Web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What port is typically used to accept administrative connections using the SSH utility?
    22
A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which one of the following tests provides the most accurate and detailed information about the security state of a server?
    Authenticated scan
A

Authenticated scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What type of network discovery scan only follows the first two steps of the TCP hand-shake?
    TCP SYN scan
A

TCP SYN scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly