Ethical Hacking Chapter 2

Card Set Information

Author:
JXN90
ID:
298983
Filename:
Ethical Hacking Chapter 2
Updated:
2015-03-23 05:06:34
Tags:
EH
Folders:

Description:
EH
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user JXN90 on FreezingBlue Flashcards. What would you like to do?


  1. The Netstat command indicates that POP3 is in use on a remote server.Which port is the remote server most likely using?
    Port 110
  2. On a Windows computer, what command can you enter to show all open ports being used?
    Netstat
  3. Which protocol uses UDP?
    TFTP
  4. Which protocol offers guaranteed delivery and is connection oriented?
    TCP
  5. TCP communication could be likened to which of the following?
    Phone conversation
  6. Which of the following protocols is connectionless? (Choose all that apply.)
    a. UDP

    b. IP
  7. Which command verifies the existence of a node on a network?
    Ping
  8. FTP offers more security than TFTP. True or False?
    True
  9. List the three components of the TCP/IP three-way handshake.
    SYN, SYN-ACK, and ACK
  10. What protocol is used for reporting or informational purposes?
    ICMP
  11. List the six flags of a TCP packet.
    SYN, ACK, PSH, URG, RST, FIN
  12. A UDP packet is usually smaller than a TCP packet. True or False?
    True
  13. What port, other than port 110, is used to retrieve e-mail?
    Port 143
  14. What port does DNS use?
    Port 53
  15. What command is used to log on to a remote server, computer, or router?
    Telnet
  16. Which of the following is not a valid octal number?
    3482
  17. The initial sequence number (ISN) is set at which step of the TCP three-way handshake?
    1 and 2
  18. A Ping command initially uses which ICMP type code?
    Type 8
  19. “Destination Unreachable” is designated by which ICMP type code?
    Type 3
  20. What’s the hexadecimal equivalent of the binary number 1111 1111?
    FF
  21. SSH and SFTP offer more security than TELNET and FTP. True or False?
    True
  22. While monitoring network traffic you see activity on a port number you do not recognize. What file could you access on Linux / Windows systems to view a list ofport numbers? (Assume no Internet access, meaning no access to Google!)

    A. hosts
    B. ports_list
    C. ssh_hosts
    D. services
    D. services
    (this multiple choice question has been scrambled)
  23. The Syrian Electronic Army attack on the New York Times website was accomplished by:(Internet search permitted)

    A. Exploiting an unpatched version of Apache which allowed them to access the web server.
    B. Compromising a database server.
    C. Hacking the domain registrar and redirecting the DNS entry to a different website.
    D. Obtaining physical access to the server and shutting it down.
    C. Hacking the domain registrar and redirecting the DNS entry to a different website.
    (this multiple choice question has been scrambled)
  24. From top to bottom, the four layers of the TCP/IP protocol stack are:

    A. Application, Transport, Internet, Network
    B. Application, Transport, Chocolate, Network
    C. Presentation, Session, Data Link, Physical
    D. Transport, Internet, Network, Application
    A. Application, Transport, Internet, Network
    (this multiple choice question has been scrambled)
  25. In the TCP/IP stack, the ____ layer is concerned with physically moving electrons across a medium.

    A. Internet
    B. Network
    C. Transport
    D. Application
    B. Network
    (this multiple choice question has been scrambled)
  26. A(n) ____ is the logical, not physical, component of a TCP connection.

    A. port
    B. ISN
    C. socket
    D. SYN
    A. port
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview