Common Network Security Attacks Flashcards
You need to scan a network and determine the OS running on each detected device. Which nmap command should you use?
Instruction: Choose the option that best answers the question.
Answer Choices
nmap 192.168.2.0/24
nmap 192.168.2.0/34 -O
nmap 192.168.2.0/24 -F
nmap 192.168.2.0/24 -O
nmap 192.168.2.0/24 -O
What can be done to mitigate RDP brute-force attacks?
Instruction: Choose all options that best answer the question.
Answer Choices
Block port 3389 at the firewall
Enable user MFA
Install a PKI certificate on the server
Do not expose servers with RDP to the Internet
Enable user MFA
Do not expose servers with RDP to the Internet
Which techniques can mitigate SQL injection attacks?
Instruction: Choose all options that best answer the question.
Answer Choices
Antimalware scanner
Input sanitization
Firewall rules
Input validation
Input sanitization
Input validation
Which command starts the Metasploit Framework console?
Instruction: Choose the option that best answers the question.
Answer Choices
chmod
beef
startx
msfconsole
msfconsole
Which free tool can be used to spoof network traffic?
Instruction: Choose the option that best answers the question.
Answer Choices
hping3
netstat
nc
nmap
hping3
What can be done to mitigate the possibility of reverse shell attacks?
Instruction: Choose the option that best answers the question.
Answer Choices
Firewall rules
Antimalware scanner
MFA
PKI certificates
Antimalware scanner
Which command starts the BeEF service?
Instruction: Choose the option that best answers the question.
Answer Choices
start-beef
run beef
beef-xss -h
beef -start
beef-xss -h