Ethical Hacking Chapter 5

Card Set Information

Author:
JXN90
ID:
298986
Filename:
Ethical Hacking Chapter 5
Updated:
2015-03-23 05:39:23
Tags:
EH
Folders:

Description:
EH
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user JXN90 on FreezingBlue Flashcards. What would you like to do?


  1. Security testers and hackers use which of the following to determine the services running on a host and the vulnerabilities associated with these services?
    Port scanning
  2. What is the most widely used port-scanning tool?
    c. Nmap
  3. To find extensive Nmap information and examples of the correct syntax to use in Linux, which of the following commands should you type?
    d. man nmap
  4. To see a brief summary of Nmap commands in a Linux shell, which of the following should you do?
    a. Type nmap -h.
  5. Which of the following Nmap commands sends a SYN packet to a computer with the IP address 193.145.85.210? (Choose all that apply.)
    a. nmap -sS 193.145.85.210

    b. nmap -v 193.145.85.210
  6. Which flags are set on a packet sent with the nmap -sX 193.145.85.202 command? (Choose all that apply.)
    a. FIN

    b. PSH

    d. URG
  7. Which Nmap command verifies whether the SSH port is open on any computers in the 192.168.1.0 network? (Choose all that apply.)
    a. nmap -v 192.168.1.0-254 -p 22

    d. nmap -v 192.168.1.0/24 -p 22
  8. A closed port responds to a SYN packet with which of the following packets?
    d. RST
  9. Which type of scan is usually used to bypass a firewall or packet-filtering device?
    a. ACK scan
  10. Security testers can use Hping to bypass filtering devices. True or False?
    True
  11. A FIN packet sent to a closed port responds with which of the following packets?
    c. RST
  12. A(n) ________ scan sends a packet with all flags set to NULL.
    a. NULL
  13. What is a potential mistake when performing a ping sweep on a network?
    • a. Including a broadcast address in the
    • ping sweep range
  14. Port scanning provides the state for all but which of the following ports?
    d. Buffered
  15. A NULL scan requires setting the FIN, ACK, and URG flags. True or False?
    False
  16. Why does the fping -f 193.145.85.201 193.145.85.220 command cause an error?
    a. An incorrect parameter is used.
  17. In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of packet to confirm that the host computer is live?
    d. ICMP Echo Reply (type 0)
  18. To bypass some ICMP-filtering devices on a network, an attacker might send which
    type of packets to scan the network for vulnerable services? (Choose all that apply.)
    b. SYN packets

    c. ACK packets
  19. Which of the following is a tool for creating a custom TCP/IP packet and sending it to a host computer?
    c. Hping
  20. Fping doesn’t allow pinging multiple IP addresses simultaneously. True or False?
    False
  21. In your role as an ethical hacker, what method would you use to determine theservices running on a host?

    A. Zone Transfers
    B. Port Scanning
    C. Zone Shifting
    D. Ping Sweep
    B. Port Scanning
    (this multiple choice question has been scrambled)
  22. When using nmap, what commands would you use to either a) find extensive information and examples of the correct syntax to use in Linux, and b) to see a brief summary of nmap commands in a Linux shell?

    A. nmap –h / man nmap
    B. man nmap / nmap –h
    C. help nmap / nmap –h
    D. nmap –help / man nmap
    B. man nmap / nmap –h
    (this multiple choice question has been scrambled)
  23. Which of the following flags are not set on a packet sent with the nmap -sX 193.145.85.202 command?

    A. URG
    B. PSH
    C. FIN
    D. SYN
    D. SYN
    (this multiple choice question has been scrambled)
  24. Both of these commands verify that the SSH Port is open on any computers in the192.168.1.0 network:
    nmap -v 192.168.1.0-254 -p 22
    nmap -v 192.168.1.0/16 -p 22

    A. True
    B. False
    B. False
  25. If you needed to bypass a firewall or packet-filtering device, what type of scanshould you use?

    A. ACK scan
    B. SYN scan
    C. XMAS scan
    D. CAT scan
    A. ACK scan
    (this multiple choice question has been scrambled)
  26. Port scanning provides the state for all but which of the following ports?

    A. Buffered
    B. Closed
    C. Open
    D. Filtered
    A. Buffered
    (this multiple choice question has been scrambled)
  27. A limitation of fping is that it doesn't allow pinging multiple IP addressess imultaneously.

    A. True
    B. False
    B. False
  28. Bonus: What scanning tool was used by Trinity in The Matrix Reload, and in what service did she discover an exploit?
    Expected Keywords: nmap, ssh

What would you like to do?

Home > Flashcards > Print Preview