Module 5 Quiz Flashcards
One of the limitations when using ping sweeps is that many network administrators configure nodes not to respond to ICMP echo requests. What type of ICMP request is being disabled by the administrator?
Reply
In any *NIX after saving a script, what command do you need to make an executable?
chmod +x
An open port allows access to specific applications and cannot be vulnerable to attack. True or False.
False
When a TCP three-way handshake ends, both parties send what type of packet to end the connection?
FIN
Closed ports respond to a NULL scan with what type of packet?
RST
Which of the following describes a program that automates a task that takes too much time to perform manually? 
customized script
What open source tool is considered to be the standard port-scanning tool for security professionals?
nmap
When using the text editor VIM what command appends text after the insertion point?
A
What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface? 
OpenVAS
To verify if all IP address of a network are being used by computers that are up and running, you can use a port scanner to perform what procedure on a range of IP addresses? 
ping sweep
What type of port scan is similar to SYN scan and is risky to use because it relies on the attacked computer’s OS? 
connect
A popular port scanner that has the ability to use a GUI front end?
nmap (Zenmap)
Allows you to ping multiple IP addresses and usually included in Kali Linux
Fping
What is a tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or modified packets
Hping
The original utility in which OpenVas was developed from
Nessus (RIP 🤣)
A port state which does not allow entry or access to a service
closed port
An open source fork of nessus
OpenVas
A port state which may indicate a firewall is being used
filtered port
These ports allow access to Applications that can be vulnerable
Open ports
Allows you to scan thousands or even tens of thousands of IP address is quickly
Nmap
Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts
Ping sweep
When security professionals create a packet, they choose a specific field to help initiate a response from the target computer. What is this called?
A Flag
Which VIM command helps delete the current line
Dd
Which VIM command insert text before the insertion point?
I
Which VIM command overwrites the last character when in insert mode?
Delete key
Which VIM command deletes the current character? 
X
Which VIM command delete the current word? 
Dw