Ethical Hacking 3 Flashcards

1
Q

Which UNIX tool can be used to determine the subnets in use on a network?

A

ICMPquery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can the ike-scan utility be used to test?

A

The ike-scan utility utilizes the IKE protocol for testing and fingerprinting VPN servers using IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have just deployed a new set of firewall parameters and wish to test firewall rules using an application that will report on what information returns in response to the test. The ideal utility should be capable of remote OS fingerprinting and the ability to discover open ports behind firewalls. What utility should you use?

A

HPing2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is NOT a typical purpose for which a proxy server is used?

A

As a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary purpose of scanning from the perspective of an attacker?

A

The purpose is to gather information about specific IPs, target operating systems and system architecture, and services running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Regarding the features of the SSL proxy tool, what statement is accurate?

A

It is built on top of the OpenSSL library.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocol can be used for banner grabbing?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Anonymizers have several limitations; what statement regarding their use is not accurate?

A

Secure protocols such as HTTPS can be anonymized, but only thought the reduction of the security encryption provides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What operating system family uses a time dependent model where the initial sequence number of a TCP connections is incremented by a fixed amount for each time period?

A

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of scanning involves attempting to connect to a target system using TCP or UDP to determine if the services are listening?

A

port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which scanning method is a basic network scanning technique to determine which range of IP addresses map to live hosts (computers)?

A

ping sweep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of scan is intended to check the services running on a target computer by sending a sequence of messages in an attempt to break in?

A

port scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A client has come to you for help in securing their network against scanning attempts. Specifically, the client wants to protect against OS fingerprinting by tools like Nmap. What should you recommend?

A

Deploy a network intrusion detection system such as snort to detect OS fingerprinting attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The TCP three-way handshake is a common networking process that is manipulated to accomplish which step of the scanning methodology?

A

Check for open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

During which step of the scanning methodology would you use a ping sweep?

A

Check for live systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of port scan is considered to be the most reliable form of TCP scanning?

A

TCP connect () scan

17
Q

What feature of TCP do attackers use to perform a half-open SYN scan?

A

Three-way handshake

18
Q

What is not a metric that is used to determine the operating system fingerprint?

A

Latency

19
Q

In passive fingerprinting, four areas are typically noted to determine the operating system. Which one is based on the number of hops to get to the target?

A

TTL

20
Q

Which scanning technique uses the IP routing function to deduce the state of a port?

A

ACK scan