Quiz 5 Flashcards
week5 minus match term questions
A disadvantage of Nmap is that it is very slow because it scans all the 65,000 ports of each computer in the IP address range
False
A ____ or batch file is a text file containing multiple commands that are normally entered manually at the command prompt.
script
A computer that receives a SYN packet from a remote computer responds to the packet with a(n) ____ packet if its port is open.
SYN/ACK
A common Linux rootkit is ____.
Linux Rootkit 5
A closed port responds to a SYN scan with an RST packet, so if no packet is received, the best guess is that the port is open.
False
A closed port can be vulnerable to an attack.
False
A ____ or batch file is a text file containing multiple commands that are normally entered manually at the command prompt.
script
An OpenVAS____________________ is a security test program (script) that can be selected from the client interface.
plug-in
Closed ports respond to a(n) ____ with an RST packet.
XMAS scan
HTTP uses port ____ to connect to a Web service.
80
How does a SYN scan work?
In a normal TCP session, a packet is sent to another computer with the SYN flag set. The receiving computer sends back a packet with the SYN/ACK flag set, indicating an acknowledgment. The sending computer then sends a packet with the ACK flag set. If the port to which the SYN packet is sent is closed, the computer responds to the SYN packet with an RST/ACK packet. If a SYN/ACK packet is received by an attacker’s computer, it quickly responds with an RST/ACK packet, closing the session. This is done so that a full TCP connection is never made and logged as a transaction. In this sense, it is “stealthy.” After all, you don’t want a transaction to be logged showing the IP address that connected to the attacked computer.
If subnetting is used in an organization, you can include the broadcast address by mistake when performing ping sweeps. How might this happen?
If you decide to use ping sweeps, be careful not to include the broadcast address in your range of addresses. You can do this by mistake if subnetting is used in an organization. For example, if the IP address 193.145.85.0 is subnetted with a 255.255.255.192 subnet mask, four subnets are created: 193.145.85.0, 193.145.85.64, 193.145.85.128, and 193.145.85.192. The broadcast addresses for each subnet are 193.145.85.63, 193.145.85.127, 193.145.85.191, and 193.145.85.255, respectively. If a ping sweep was inadvertently activated on the range of hosts 193.145.85.65 to 193.145.85.127, an inordinate amount of traffic could flood through the network because the broadcast address of 193.145.85.127 was included. This would be more of a problem on a Class B address, but if you perform ping sweeps, make sure your client signs a written agreement authorizing the testing.
In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be “____”.
unfiltered
Nmap has a GUI version called ____________________ that makes it easier to work with some of the more complex options.
Zenmap
Port scanning is a method of finding out which services a host computer offers.
True