IS4560 CH 6 Port Scanning Flashcards

1
Q
1. \_\_\_\_\_\_\_\_ is a popular though easily detectable scanning technique.
A. Full connect 
B. Half open scanning 
C. NULL scan 
D. Xmas tree scan
A

Full connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
2. Which of the following is the Nmap command line switch for a full connect port scan?
A. -sS 
B. -sU 
C. -sT 
D. -O
A

-sT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
3. Which of the following is an example of a passive fingerprinting tool?
A. Superscan 
B. Xprobe2 
C. Nmap 
D. p0f
A

p0f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. TCP and UDP both use flags.
    A. True
    B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following statements is most correct?
    A. Active fingerprinting tools inject packets into the network.
    B. Passive fingerprinting tools inject traffic into the network.
    C. Nmap can be used for passive fingerprinting.
    D. Passive fingerprinting tools do not require network traffic to fingerprint an operating
    system.
A

Active fingerprinting tools inject packets into the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
6. Which of the following is not a network mapping tool?
A. Solarwinds 
B. Netstat 
C. Cheops 
D. Harris Stat
A

Netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
7. \_\_\_\_\_\_\_\_ is the point at which an attacker starts to plan his or her attack.
A. Active OS fingerprinting 
B. Passive OS fingerprinting 
C. Port scanning 
D. Analyzing the results
A

Analyzing the results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
8. A XMAS tree scan sets all of the following flags except \_\_\_\_\_\_\_\_.
A. SYN 
B. URG 
C. PSH 
D. FIN
A

SYN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. In chapter 6, of the two protocols discussed, which is more difficult to scan for?
A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
10. You have been asked to perform a port scan for POP3. Which port will you scan for?
A. 22 
B. 25 
C. 69 
D. 110
A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

11.Ping scanning does not identify open ports.
A. True
B. False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
12. The process of determining the underlying version of the system program being used is best described as \_\_\_\_\_\_\_\_.
A. OS fingerprinting 
B. Port scanning 
C. Wardialing 
D. Wardriving
A

OS fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
13. Which of the following switches is used for an ACK scan? 
A. -sI 
B. -sS 
C. -sA 
D. –sT
A

-sA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly