Port Scanners Flashcards

1
Q

What are the options of NMAP to control the timing of scanning speeds?

A

-T1 -T2 -T3 -T4 -T5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This NMAP Parameter will commence a XMAS scan on a device

A

-sX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This NMAP Parameter will export the scan results as an XML for external manipulation.

A

-oX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nmap’s default scan with admin privledges

-Pn
-sT
-sS
sU

A

-sS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nmap’s default scan with admin privledges

-Pn
-sT
-sS
sU

A

-sS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nmaps default scan with without admin privledges

-Pn
-sT
-sS
sU

A

-sT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This NMAP Parameter will give more information on basic scans implemented

A

-v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ - This port state is the result of an active port with an application that is actively accepting TCP connections.

A

Open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This NMAP Parameter will scan only the provided ports input

A

-p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ Is the result when it cannot determine whether the port is active because packet sorting stops connections from reaching the port. It could be the result of a dedicated firewall device, router, router rules or host-based firewall software.

A

Filtered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Make an nmap scan for nonexist.org and Include more information:

A

nmap -v nonexist.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What flags are sent in a christmas scan?

SYN,SYN/ACK,PSH,ACK
FIN,PSH,URG
FIN,PSH,URG,SYN,SYN/ACK
FIN,SYN,SYN/ACK,PSH

A

FIN,PSH,URG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This parameter with specified numbers will scan all ports

A

-p 0-65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What tool utilizes the command “ping scan”.

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What tool would utilize the command: nc -z -v site.com?

A

Netcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port Scanning does what?

checks IP addresses
determines number of hops between routes
determines fastest route to delivery packets
to check which ports are open

A

to check which ports are open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What tool is used to read and write data across network connections using TCP or UDP protocol?

A

NetCat/Cryptcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following tasks can NOT be done using Nmap?

Quickly recognize devices on a single or multiple networks
Monitor large networks
Transfer files across the network
Detects security risks

A

Transfer files across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This NMAP parameter/option will assume every host in a network scan is online. Example: -sS

A

-Pn

20
Q

This NMAP Parameter will enable you to import a list of ip addresses or networks to scan

A

-iL

21
Q

Nmap scans how many ports by default if not specified?

500 ports
1000 ports
Top 1000 used ports
All well known ports

A

Top 1000 used ports

22
Q

When implementing nmap on a network its capabilities can include identifying ports, servers and active hosts within the network scope. What type of reconissiance is nmap classified to implement on a network?

Recursive
Active
Passive
Port-scanner

A

Active

23
Q

This NMAP parameter will enable OS detection

A

-O

24
Q

____ The result of a port that is active but has no application listening on it.

A

Closed

25
Q

Nmap has the capability to integrate scripts

TRUE
FALSE

A

TRUE

26
Q

____ Is the result when nmap can connect to a port but is unable to verify ports as active or deactivated

A

Unfiltered

27
Q

Create a nmap scan that will scan a 198.216.0.0/16 network for version information on services ssh,dns,pop3 and RDP

A

nmap -sV 198.216.0.0/16 -p 22,53,110,3367

28
Q

This Parameter will control the timing of scanning and takes the longest time to assist in avoiding detection.

A

-T0

29
Q

Nmap scans are a form of what type of reconnisance?

A

Active

30
Q

True or False: Nmap utilizes a graphical user interface known as Zmap that develops visual nc -l – This command will instruct mappings of a network for better usability and reporting.

True
False

A

False: Zenmap

31
Q

Which term correctly fills in the blank? ScanLine is a command-line port scanner for all ______ platforms.

ChromeOS
MacOS
Windows
Linux

A

Windows

32
Q

Which tool is used for vulnerability scanning and network discovery?

Netcat
Cisco Packet Tracer
ZenMap
Nmap

A

Nmap

33
Q

True or False: Netcat was designed to be a reliable front-end tool that can be used directly or easily driven by other programs and scripts.

True
False

A

False: Back-end

34
Q

CryptCat uses what encryption method?

AES
TwoFish
DES
ThreeFish

A

TwoFish

35
Q

True or False: In order to conduct port scanning you first need a list of what hosts are on the network along with the IP addresses.

True
False

A

True

36
Q

Which of the following are advantages to port scanning? Select all that apply:

Finding open and vulnerable server locations
Checking security settings
Identifying hosts connected to the network and the services that are running on them
All of the above

A

All of the Above

37
Q

This type of scanning is performed by sending an SYN packet and analyzing the response. What type of scan is this?

A

Syn Scan

38
Q

TwoFish encryption utilizes _____ and one ____ key.

Symmetric encryption and uses one 128-bit key
Symmetric encryption and uses one 256-bit key
Asymmetric encryption and uses one 2048-bit key
None of the above

A

Symmetric encryption and uses one 256-bit key

39
Q

Which of these is the simplest port scan?

TCP Half Open Port Scan
UDP
Ping Scan
None of the above

A

Ping Scan

40
Q

True or False: While port scanning is an incredibly useful tool for malicious actors to use during reconnaissance, it is not nearly as useful for IT admin staff.

True
False

A

False: Useful for both actors

41
Q

Which of these functions can be performed using ScanLine?

ICMP TimeStamp Scanning
TCP Scanning
UDP Scanning
All of the above

A

All of the above

42
Q

This command will do what function? nc -l

This command will print a list of all of the available commands you can use in Netcat.
This will run a basic port scan of the specified website or server.
This command will instruct the local system to begin listening for TCP connections and UDP activity on a specific port number.
None of the above

A

This command will instruct the local system to begin listening for TCP connections and UDP activity on a specific port number.

43
Q

True or False: A number of TCP protocol techniques actually make it possible for attackers to conceal their network location and use “decoy traffic” to perform port scans without revealing any network address to the target.

True
False

A

True

44
Q

Fill in the blank: Ports 0 to _____ are well known port numbers that are designed for Internet use although they can have specialized purposes as well.

1023
65,536
1064
783

A

1023

45
Q

Fill in the blank: Ports range from 0 to ______and basically rank by popularity.

1023
65,536
1064
783

A

65,536

46
Q

The range of ports mentioned in question 22 are administered by what organization?

National Security Agency
Defense Information Systems Agency
Cybersecurity and Infrastructure Security Agency
Internet Assigned Numbers Authority

A

Internet Assigned Numbers Authority

47
Q

2
Fill in the Blank: What are the general protocols used for port scanning?

TCP, ICMP
UDP, FTTP
TCP, SMTP
None of the Above

A

None of the Above: They are TCP and UDP