Network Enumeration PEs Flashcards

1
Q

____________ is the process of collecting information without performing any analysis to identify a host, or obtain more details on a host.

A

Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____________ is the recording, aka sniffing, and analysis of packet streams to determine hosts and network characteristics.

A

Passive OS fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____________ is the recording, aka sniffing, and analysis of packet streams to determine hosts and network characteristics.

A

Passive Fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passive OS fingerprinting is highly intrusive so there is a detection concern status of HIGH when performing this task.

A

False. It is not intrusive at all and leaves very little record of presence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SGT McGill has been using Wireshark to discover hosts on a network of interest and determine characteristics of that network. What action has SGT McGill been performing?

A

Passive Fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three responses a user may receive when conducting active port scans?

A

Open, Closed, Filtered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Determine whether the technique presented is Active Fingerprinting, Passive Fingerprinting or Neither. SPC Morales used Xprobe2 to send UDP packets to all hosts within a targeted netblock to determine OS based on the system’s response.

A

Active Fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Determine whether the technique presented is Active Fingerprinting, Passive Fingerprinting or Neither. SSG Smith is using Satori to analyze a network’s DHCP parameters.

A

Passive Fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A particular technique that prevents alerts from occurring to the host machine

A

Degrade, Deny, Destroy, Disrupting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This could potentially alert users on the network through logs, alerts, or artifacts left behind.

A

Active Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

________________ is a technique used for determining what operating system (OS) is running on a remote computer.

A

OS Fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why do you think it is important to know which service is using which port?

A

For understanding which data is going through secured traffic and which is not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Banner grabbing is a technique used to gain information about a remote server and is often used as part of a reconnaissance attack.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__________ is a tool used to discover live hosts, services, network inventory, managing service upgrade schedules, monitoring host or service uptime, filters/firewalls, or specific operating systems by analyzing the response from the raw IP packets sent to a target system.

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A lot of information can be discovered during scanning enumeration. Select what is NOT part of the list.(According to information provided in the slides). Choose the letter associated with the proper answer.

A. Protocols – OS, type of server
B. Users and passwords
C. IP address – size of network, network map
D. Binary configuration,Fetch-Decode-Execute
E. Services – exploitation, protection measures

A

D. Binary configuration,Fetch-Decode-Execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If you are monitoring traffic through a mirrored port on a switch. By analyzing this traffic, you are able to determine the operating system of the device connected to the switch. What is this describe?

() Active fingerprinting
() Port Scanning
() Vulnerability scanning
() Passive fingerprinting

A

Passive fingerprinting

17
Q

All of the following can be used for passive fingerprinting EXCEPT:

  • Wireshark
  • NetSleuth
  • Xprobe2
  • Satori
A

Xprobe2

18
Q

_____________ is sending normal or malformed packets to a target, and monitoring its response.

A
19
Q

_____________ is sending normal or malformed packets to a target, and monitoring its response.

A

Active Fingerprinting

20
Q

Determine whether the technique presented is Active Fingerprinting, Passive Fingerprinting or Neither. PFC Reyes is flooding a targeted network with internet traffic so that users on that network are unable to utilize network resources.

A

Neither

21
Q

The process of gathering information without performing analysis is:

A

Scanning

22
Q

A method discreetly recording and performing analysis of streaming packets to determine devices and the characteristics of the network characteristics

A

Passive Fingerprinting

23
Q

Which of the following is the port number for SNMP?

A

161

24
Q

_____________ is defined as the process of extracting user names, machine names, network resources, shares and services from a system.

A

Enumeration

25
Q

_____________ is defined as the process of extracting user names, machine names, network resources, shares and services from a system.

A

Enumeration

26
Q

The third phase of the Cyber Kill Chain is to discover vulnerabilities that Cyber criminals may annotate.

A