Module 5 Quiz Flashcards

1
Q

One of the limitations when using ping sweeps is that many network administrators configure nodes not to respond to ICMP echo requests. What type of ICMP request is being disabled by the administrator?

A

Reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In any *NIX after saving a script, what command do you need to make an executable?

A

chmod +x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An open port allows access to specific applications and cannot be vulnerable to attack. True or False.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When a TCP three-way handshake ends, both parties send what type of packet to end the connection?

A

FIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Closed ports respond to a NULL scan with what type of packet?

A

RST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following describes a program that automates a task that takes too much time to perform manually? 

A

customized script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What open source tool is considered to be the standard port-scanning tool for security professionals?

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When using the text editor VIM what command appends text after the insertion point?

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface? 

A

OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To verify if all IP address of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses? 

A

ping sweep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of port scan is similar to SYN scan and is risky to use because it relies on the attacked computer’s OS? 

A

connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A popular port scanner that has the ability to use a GUI front end?

A

nmap (Zenmap)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Allows you to ping multiple IP addresses and usually included in Kali Linux

A

Fping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or modified packets

A

Hping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The original utility in which OpenVas was developed from

A

Nessus (RIP 🤣)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A port state which does not allow entry or access to a service

A

closed port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An open source fork of nessus

A

OpenVas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A port state which may indicate a firewall is being used

A

filtered port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

These ports allow access to Applications that can be vulnerable

A

Open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Allows you to scan thousands or even tens of thousands of IP address is quickly

A

Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts

A

Ping sweep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When security professionals create a packet, they choose a specific field to help initiate a response from the target computer. What is this called?

A

A Flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which VIM command helps delete the current line

A

Dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which VIM command insert text before the insertion point?

A

I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which VIM command overwrites the last character when in insert mode?

A

Delete key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which VIM command deletes the current character? 

A

X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which VIM command delete the current word? 

A

Dw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which VIM command replaces the previously deleted text? 

A

P

29
Q

Which VIM command exits and saves all changes?

A

ZZ

30
Q

Which VIM command writes changes and quits the edit session

A

Wq

31
Q

This line identifies that you are writing the file as a script

A

!/bin/sh

32
Q

What command do you use in VIM to set the value to zero? 

A

count=0

33
Q

In VIM, what condition do you need to add in order to avoid an endless loop? 

A

while

34
Q

This statement is where the script performs its main task

A

do

35
Q

This command is used to write data into a file

A

printf

36
Q

What command do you use to run your script

A

./

37
Q

What command allows you to view your .txt file

A

cat

38
Q

What type of scans are more difficult to detect, rather than sending an inordinate amount of pings or packets?

A

stealth

39
Q

A limitation of ping sweep…What type of ICMP echo message is sometimes disabled by administrators?

A

reply

40
Q

What is an nmap GUI front end?

A

Zenmap

41
Q

In a normal TCP session, The sender sends A packet to another computer with what flag set?

A

SYN

42
Q

How would an attacker make their port scans more difficult to detect? 

A

By limiting their scan speeds

43
Q

What advance port scanning tool can allow a security tester to bypass Filtering devices by injecting crafted or modified IP packets into a network? 

A

Hping

44
Q

Which of the following describes a  text file containing multiple commands that would usually be entered manually at the command prompt? 

A

script

45
Q

What network security tool usually included in Kali Linux allows a user to ping multiple IP addresses? 

A

Fping

46
Q

What port scan has FIN, PSH, and URG flag set? 

A

XMAS scan

47
Q

Port scanner that can identify which IP addresses belong to active hosts

A

Ping Sweep

48
Q

Attackers typically use ACK scans to get past firewall or filtering devices. True or false

A

True

49
Q

An open port allows access to specific applications and cannot be vulnerable to attacks. True or false

A

False

50
Q

You can search for vulnerabilities and a host by using a port scanning tool. True or false

A

True

51
Q

Port scanning is a method of finding out which services a host computer offers. True or false

A

True

52
Q

In an ACK scan, if the attacked port RETURNS a RST packet, The port is operating in what state? 

A

unfiltered

53
Q

In a NULL scan all packets are turned on. True or false

A

False

54
Q

Which of the following is a tool for creating a custom TCP/IP packet and sending it to a host computer?

A

Hping

55
Q

In basic network scanning, ICMP Echo requests type 8  are sent to host computers from the attacker who waits for which type of packet to confirm that the host computer is live?

A

ICMP echo reply type 0

56
Q

What is a potential mistake when performing a ping sweep of a net work?

A

Including a broadcast address in the ping sweep range

57
Q

A NULL scan requiree setting the FIN, ACK, and URG flags. True or False? 

A

False

58
Q

A closed port responds to a SYN packet with which of the following packets? 

A

RST

59
Q

Fping doesn’t allow pinging multiple IP address is simultaneously. True or false?

A

False

60
Q

Security testers and hackers use which of the following to determine the service is running on a host and the vulnerabilities associated with these services?

A

Port scanning

61
Q

A FIN packet sent to a close to port response with which of the following packets?

A

RST

62
Q

Which type of Port scan sends a packet with all flags turned off?

A

NULL

63
Q

To find extensive nmap information and examples of the correct syntax to use in Linux, which of the following commands should you type?

A

man nmap

64
Q

Security testers can use H ping to bypass filtering devices. True or false?

A

True

65
Q

Which command shows you a brief summary of nmap commands in a linux shell

A

nmap -h

66
Q

Why does the fping -f 193.145.85.201 193.145.85.220 command cause error?

A

An incorrect parameter is used

67
Q

Which parameter can be added to nmap to run a Script scan with the default scripts?

A

-sC

68
Q

Port scanning provides the state for all but which of the following ports?

A

Buffering