PE 3 - Scanning and Enumeration Flashcards
Your team is hired to test a business named Matt’s Bait ‘n Tackle Shop (domain name mattsBTshop.com). A team member runs the following command:
metagoofil –d mattsBTshop.com –t doc, docx –l 50 –n 20 –f results.html
Which of the following best describes what the team member is attempting to do?
A. Extract metadata info from web pages in mattsBTshop.com, outputting results in Microsoft Word format.
B. Extract metadata info from the results.html page in mattsBTshop.com, outputting results in Microsoft Word format.
C. Extract metadata info from Microsoft Word documents found in mattsBTshop.com, outputting results in an HTML file.
D. Uploading results.html as a macro attachment to any Microsoft Word documents found in mattsBTshop.com.
A. Extract metadata info from web pages in mattsBTshop.com, outputting results in Microsoft Word format.
Which of the following is true regarding the p0f tool?
A. It is an active OS fingerprinting tool.
B. It is a passive OS fingerprinting tool.
C. It is designed to extract metadata for Microsoft files.
D. It is designed for remote access.
B. It is a passive OS fingerprinting tool.
You have a zombie system ready and begin an IDLE scan. As the scan moves along, you notice that fragment identification numbers gleaned from the zombie machine are incrementing randomly. What does this mean?
A. Your IDLE scan results will not be useful to you.
B. The zombie system is a honeypot.
C. There is a misbehaving firewall between you and the zombie machine.
D. This is an expected result during an IDLE scan.
A. Your IDLE scan results will not be useful to you.
You want to perform a ping sweep of a subnet within your target organization. Which of the following nmap command lines is your best option?
A. nmap 192.168.1.0/24
B. nmap -sT 192.168.1.0/24
C. nmap -sP 192.168.1.0/24
D. nmap -P0 192.168.1.0/24
C. nmap -sP 192.168.1.0/24
A team member runs an Inverse TCP scan. What is the expected return for an open port?
A. Open ports respond with a SYN/ACK.
B. Open ports respond with a RST.
C. Open ports respond with a FIN.
D. Open ports do not respond at all.
D. Open ports do not respond at all.
You are examining traffic to see if there are any network-enabled printers on the subnet. Which of the following ports should you be monitoring for?
A. 53
B. 88
C. 445
D. 514
E. 631
E. 631
A colleague enters the following command:
root@mybox: # hping3 –A 192.168.2.x –p 80
What is being attempted here?
A. An ACK scan using hping3 on port 80 for a single address
B. An ACK scan using hping3 on port 80 for a group of addresses
C. Address validation using hping3 on port 80 for a single address
D. Address validation using hping3 on port 80 for a group of addresses
B. An ACK scan using hping3 on port 80 for a group of addresses
You are examining traffic between hosts and note the following exchange:
Which of the following statements are true regarding this traffic? (Choose all that apply.)
A. It appears to be part of an ACK scan.
B. It appears to be part of an XMAS scan.
C. It appears port 4083 is open.
D. It appears port 4083 is closed.
B. It appears to be part of an XMAS scan.
C. It appears port 4083 is open.
You are examining traffic and notice an ICMP Type 3, Code 13 response. What does this normally indicate?
A. The network is unreachable.
B. The host is unknown.
C. Congestion control is enacted for traffic to this host.
D. A firewall is prohibiting connection.
D. A firewall is prohibiting connection.
Which port-scanning method presents the most risk of discovery but provides the most reliable results?
A. Full-connect
B. Half-open
C. Null scan
D. XMAS scan
A. Full-connect
As a pen test on a major international business moves along, a colleague discovers an IIS server and a mail exchange server on a DMZ subnet. You review a ping sweep accomplished earlier in the day on that subnet and note neither machine responded to the ping. What is the most likely reason for the lack of response?
A. The hosts might be turned off or disconnected.
B. ICMP is being filtered.
C. The destination network might be down.
D. The servers are Linux based and do not respond to ping requests.
B. ICMP is being filtered.
A team member is using nmap and asks about the “scripting engine” in the tool. Which option switches can be used to invoke the nmap scripting engine? (Choose two.)
A. –script
B. -z
C. -sA
D. -sC
A. –script
D. -sC
Which of the following commands is the best choice to use on a Linux machine when attempting to list processes and the UIDs associated with them in a reliable manner?
A. ls
B. chmod
C. pwd
D. lsof
D. lsof
You want to display active and inactive services on a Windows Server machine. Which of the following commands best performs this service?
A. sc query
B. sc query type=all
C. sc query type=service
D. sc query state= all
D. sc query state= all
An administrator enters the following command on a Linux system:
iptables -t nat -L
Which of the following best describes the intent of the command entered?
A. The administrator is attempting a port scan.
B. The administrator is configuring IP masquerading.
C. The administrator is preparing to flood a switch.
D. The administrator is preparing a DoS attack.
B. The administrator is configuring IP masquerading.