Module 3 - Scanning Networks Flashcards
Which type of message would begin a TCP 3-way handshake?
A) SYN-ACK
B) SYN
C) ACK
D) RST
B
Which one of these activities would allow an attacker to create a map or outline of the network infrastructure to learn about the environment before attempting to hack it?
A) Enumeration
B) Vulnerability analysis
C) Scanning networks
D) Malware analysis
C
If you want to check if a host is up and running on your network using nmap, you can perform a “ping scan”. There are several methods for doing this, such as an ARP ping, an ACK ping, etc. Which command below will tell nmap to perform a TCP SYN ping scan?
A) nmap -sn -PO <target>
B) nmap -sn -PA <target>
C) nmap -sn -PS <target>
D) nmap -sn -PP <target></target></target></target></target>
C
Which scanning technique will use a spoofed IP address and a SYN flag to generate port responses?
A) FIN
B) SYN
C) IDLE (side-channel)
D) XMAS
C
What type of scan is this?
Open port:
SYN->
<-SYN + ACK
RST->
Closed port:
SYN->
<-RST
A) Stealth Scan
B) Full Scan
C) XMAS Scan
D) FIN Scan
A
You are scanning a network to ensure it is as secure as possible. You send a TCP probe packet to a host with a FIN flag and you receive a RST/ACK response. What does this mean about the port you are scanning?
A)This response means the port is open.
B) The RST/ACK response means the port is disabled.
C) This means the port is half open.
D) This means that the port is closed.
D
TCP SYN Flood attack abuses the three-way handshake mechanism.
An attacker at system A sends a SYN packet to victim at system B.
System B sends a SYN/ACK packet to A.
Normally, A should send an ACK packet to system B, however, system A does not send an ACK packet to system B. In this case client B is waiting for an ACK packet from client A.
This status of client B is called _________________
A) “half-closed”
B) “half open”
C) “full-open”
D) “xmas-open”
B
The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:
Time:Mar 13 17:30:15 Port:20 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
Time:Mar 13 17:30:17 Port:21 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
Time:Mar 13 17:30:19 Port:22 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
Time:Mar 13 17:30:21 Port:23 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
Time:Mar 13 17:30:22 Port:25 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
Time:Mar 13 17:30:23 Port:80 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
Time:Mar 13 17:30:30 Port:443 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP
What type of activity has been logged?
A) Port scan targeting 192.168.1.103
B) Teardrop attack targeting 192.168.1.106
C) Denial of service attack targeting 192.168.1.103
D) Port scan targeting 192.168.1.106
D
Which Nmap option would let you do a very fast scan, even though it might increase the chances of your activities being detected?
A) -O
B) -A
C) -T0
D) -T5
D
What is typically the default TTL value for a Windows system?
A) 64
B) 128
C) 142
D) 255
B
While trying to evade the IDS, which command would scan common ports with the least amount of “noise”?
A) Nmap –sT –O –T0
B) Nmap –A –Pn
C) Nmap –A –host-timeout 99 –T1
D) Nmap –sT –p -65535 –T5
A
After doing an nmap scan you see some open ports on your webserver, including port 80. Which nmap switch would also include the type and version number of the server?
A) -V
B) -sV
C) -Pn
D) -sS
B
What results will the following command yield: ‘NMAP –sS –O –p 123-153 192.168.100.3?
A) A stealth scan, checking open ports 123 to 153.
B) A stealth scan, checking all open ports excluding ports 123 to 153.
C) A stealth scan, opening port 123 and 153.
D) A stealth scan, determine operating system, and scanning ports 123 to 153.
D
After scanning a network, you find that a machine has port 80 open, indicating that it’s a web server. You want more information about the service and its version number, so you run an nmap scan with the -sV switch. It returns the following information:
80/tcp open http-proxy Apache Server 2.4.43
What’s the name of this method of information-gathering?
A) Banner grabbing
B) WHOIS lookup
C) Brute forcing
D) Dictionary attack
A
While performing an Xmas scan, which of these would indicate that the target’s port is closed?
A) SYN
B) ACK
C) RST
D) No return response.
C
What does this command do?
> NMAP -sn 192.168.11.200-215
A) Port scan
B) Ping scan
C) Trace sweep
D) Operating system detection
B