PORT SCANNING PEs Flashcards
True or False: Netcat was designed to be a reliable front-end tool that can be used directly or easily driven by other programs and scripts.
False. Netcat is a backend tool
True or False: In order to conduct port scanning you first need a list of what hosts are on the network or the IP addresses.
True
Which term correctly fills in the blank? ScanLine is a command-line port scanner for all ______ platforms.
- ChromeOS
- MacOS
- Windows
- Linux
Windows
CryptCat uses what encryption method?
TwoFish
Ports range from 0 to ______and basically rank by popularity.
65535
For a total there are 65536 ports when you include port 0
Which of these is the simplest port scan?
- TCP Half Open Port Scan
- UDP
- Ping Scan
- None of the above
Ping Scan
TwoFish encryption utilizes _____ and one ____ key.
Symmetric encryption and uses one 256-bit key
Which of the following best describes what ports are?
- Ports are a way for computers to interact with humans.
- Ports are the doorways in a computer that allow for data and information to be exchanged.
- Ports allow humans to communicate directly with machines.
- They are a tool used to scan for open doorways in a computer.
Ports are the doorways in a computer that allow for data and information to be exchanged.
This type of scanning is performed by sending an SYN packet and analyzing the response. What type of scan is this?
SYN scan
What command is being utilized?: nc -z -v site.com?
Netcat
Which of the following tasks can NOT be done using Nmap?
- Quickly recognize devices on a single or multiple networks
- Monitor large networks
- Transfer files across the network
- Detects security risks
Transfer Files across the network
Which tool is used for vulnerability scanning and network discovery?
Nmap
Nmap utilizes a graphical user interface known as Zmap that develops visual nc -l – This command will instruct mappings of a network for better usability and reporting.
FALSE
ZMap is a free and open-source security scanner that was developed as a faster alternative to Nmap. ZMap was designed for information security research and can be used for both white hat and black hat purposes.
True or False: While port scanning is an incredibly useful tool for malicious actors to use during reconnaissance, it is not nearly as useful for IT admin staff.
False.
It is extremely useful for both malicious actors and IT admin staff (defense)
Port Scanning does what?
to check which ports are open
Which of the following are advantages to port scanning? Select all that apply:
- Finding open and vulnerable server locations
- Checking security settings
- Identifying hosts connected to the network and the services that are running on them
- All of the above
All of the above
Fill in the blank: Ports 0 to _____ are well known port numbers that are designed for Internet use although they can have specialized purposes as well.
1023
True or False: A number of TCP protocol techniques actually make it possible for attackers to conceal their network location and use “decoy traffic” to perform port scans without revealing any network address to the target.
True.
Which of these functions can be performed using ScanLine?
- ICMP TimeStamp Scanning
- TCP Scanning
- UDP Scanning
- All of the above
All of the above