Module 5 Quiz Flashcards
One of the limitations when using ping sweeps is that many network administrators configure nodes not to respond to ICMP echo requests. What type of ICMP request is being disabled by the administrator?
Reply
In any *NIX after saving a script, what command do you need to make an executable?
chmod +x
An open port allows access to specific applications and cannot be vulnerable to attack. True or False.
False
When a TCP three-way handshake ends, both parties send what type of packet to end the connection?
FIN
Closed ports respond to a NULL scan with what type of packet?
RST
Which of the following describes a program that automates a task that takes too much time to perform manually? 
customized script
What open source tool is considered to be the standard port-scanning tool for security professionals?
nmap
When using the text editor VIM what command appends text after the insertion point?
A
What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface? 
OpenVAS
To verify if all IP address of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses? 
ping sweep
What type of port scan is similar to SYN scan and is risky to use because it relies on the attacked computer’s OS? 
connect
A popular port scanner that has the ability to use a GUI front end?
nmap (Zenmap)
Allows you to ping multiple IP addresses and usually included in Kali Linux
Fping
What is a tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or modified packets
Hping
The original utility in which OpenVas was developed from
Nessus (RIP 🤣)
A port state which does not allow entry or access to a service
closed port
An open source fork of nessus
OpenVas
A port state which may indicate a firewall is being used
filtered port
These ports allow access to Applications that can be vulnerable
Open ports
Allows you to scan thousands or even tens of thousands of IP address is quickly
Nmap
Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts
Ping sweep
When security professionals create a packet, they choose a specific field to help initiate a response from the target computer. What is this called?
A Flag
Which VIM command helps delete the current line
Dd
Which VIM command insert text before the insertion point?
I
Which VIM command overwrites the last character when in insert mode?
Delete key
Which VIM command deletes the current character? 
X
Which VIM command delete the current word? 
Dw
Which VIM command replaces the previously deleted text? 
P
Which VIM command exits and saves all changes?
ZZ
Which VIM command writes changes and quits the edit session
Wq
This line identifies that you are writing the file as a script
!/bin/sh
What command do you use in VIM to set the value to zero? 
count=0
In VIM, what condition do you need to add in order to avoid an endless loop? 
while
This statement is where the script performs its main task
do
This command is used to write data into a file
printf
What command do you use to run your script
./
What command allows you to view your .txt file
cat
What type of scans are more difficult to detect, rather than sending an inordinate amount of pings or packets?
stealth
A limitation of ping sweep…What type of ICMP echo message is sometimes disabled by administrators?
reply
What is an nmap GUI front end?
Zenmap
In a normal TCP session, The sender sends A packet to another computer with what flag set?
SYN
How would an attacker make their port scans more difficult to detect? 
By limiting their scan speeds
What advance port scanning tool can allow a security tester to bypass Filtering devices by injecting crafted or modified IP packets into a network? 
Hping
Which of the following describes a  text file containing multiple commands that would usually be entered manually at the command prompt? 
script
What network security tool usually included in Kali Linux allows a user to ping multiple IP addresses? 
Fping
What port scan has FIN, PSH, and URG flag set? 
XMAS scan
Port scanner that can identify which IP addresses belong to active hosts
Ping Sweep
Attackers typically use ACK scans to get past firewall or filtering devices. True or false
True
An open port allows access to specific applications and cannot be vulnerable to attacks. True or false
False
You can search for vulnerabilities and a host by using a port scanning tool. True or false
True
Port scanning is a method of finding out which services a host computer offers. True or false
True
In an ACK scan, if the attacked port RETURNS a RST packet, The port is operating in what state? 
unfiltered
In a NULL scan all packets are turned on. True or false
False
Which of the following is a tool for creating a custom TCP/IP packet and sending it to a host computer?
Hping
In basic network scanning, ICMP Echo requests type 8  are sent to host computers from the attacker who waits for which type of packet to confirm that the host computer is live?
ICMP echo reply type 0
What is a potential mistake when performing a ping sweep of a net work?
Including a broadcast address in the ping sweep range
A NULL scan requiree setting the FIN, ACK, and URG flags. True or False? 
False
A closed port responds to a SYN packet with which of the following packets? 
RST
Fping doesn’t allow pinging multiple IP address is simultaneously. True or false?
False
Security testers and hackers use which of the following to determine the service is running on a host and the vulnerabilities associated with these services?
Port scanning
A FIN packet sent to a close to port response with which of the following packets?
RST
Which type of Port scan sends a packet with all flags turned off?
NULL
To find extensive nmap information and examples of the correct syntax to use in Linux, which of the following commands should you type?
man nmap
Security testers can use H ping to bypass filtering devices. True or false?
True
Which command shows you a brief summary of nmap commands in a linux shell
nmap -h
Why does the fping -f 193.145.85.201 193.145.85.220 command cause error?
An incorrect parameter is used
Which parameter can be added to nmap to run a Script scan with the default scripts?
-sC
Port scanning provides the state for all but which of the following ports?
Buffering