Chapter 15 – Security Assessment and Testing Flashcards
1
Q
- Which one of the following tools is used primarily to perform network discovery scans?
Nmaps
A
Nmaps
2
Q
- Adam recently ran a network port scan of a web server running in his organization. He ran the scan from an external network to get an attacker’s perspective on the scan. Which one of the following results is the greatest cause for alarm?
1433/open
A
1433/open
3
Q
- Which one of the following factors should not be taken into consideration when planning a security testing schedule for a particular system?
Desire to experiment with new testing tools
A
Desire to experiment with new testing tools
4
Q
- Which of the following is not normally included in a security assessment?
Mitigation of vulnerabilities
A
Mitigation of vulnerabilities
5
Q
- Who is the intended audience for a security assessment report?
Management
A
Management
6
Q
- Beth would like to run an nmap scan against all of the systems on her organization’s private network. These include systems in the 10.0.0.0 private address space. She would like to scan this entire private address space because she is not certain what subnets are used. What network address should Beth specify as the target of her scan?
- 0.0.0/8
A
10.0.0.0/8
7
Q
- Alan ran an nmap scan against a server and determined that port 80 is open on the server. What tool would likely provide him the best additional information about the server’s purpose and the identity of the server’s operator?
Web browser
A
Web browser
8
Q
- What port is typically used to accept administrative connections using the SSH utility?
22
A
22
9
Q
- Which one of the following tests provides the most accurate and detailed information about the security state of a server?
Authenticated scan
A
Authenticated scan
10
Q
- What type of network discovery scan only follows the first two steps of the TCP hand-shake?
TCP SYN scan
A
TCP SYN scan