FC 2 -50.txt

Card Set Information

Author:
Sanford111
ID:
44225
Filename:
FC 2 -50.txt
Updated:
2010-10-22 15:27:14
Tags:
CEH
Folders:

Description:
CEH 2
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Sanford111 on FreezingBlue Flashcards. What would you like to do?


  1. What ICMP code is used in a ping command
    ICMP Echo request uses code 8 and Echo Reply uses 0.
  2. True or false: You can run a null scan against Windows systems
    False. Running null scans on Windows systems produces incorrect results.
  3. How do you detect the type of OS and application running on a remote server
    Telnet to the open port
  4. What port-scanning system uses IPIDs
    IDLE scanning
  5. True or false: UDP is a connection-oriented protocol
    False
  6. What is the default password used by SNMP
    Public
  7. What is the ICMP message type for "destination unreachable"
    3
  8. What response will you get for a FIN scan when the port is closed
    RST
  9. What response will you get for a FIN scan when the port is open
    No response
  10. List the two types of hacking attacks.answer
    Active attack and passive attack
  11. What response will you get for an XMAS scan when the port is closed
    RST
  12. What response will you get for an XMAS scan when the port is open
    No response
  13. Which type of Nmap scan is most reliable
    Connect scan
  14. Which organization investigates computer crimes in the United States
    National Infrastructure Protection Center (NIPC)
  15. What service listens on port 139
    SMB
  16. True or false: SNMPv1
    the community string
  17. What part of SID is used for the Administrator account
    500
  18. Which tool can you use for zone transfer
    Dig
  19. What ports do you block to prevent NetBIOS traffic from entering the network
    135
  20. What encryption algorithm does a LAN Manager (LM) use
    DES
  21. How do you view old versions of web pages
    Visit www.archive.org (the Wayback Machine).
  22. What is a rootkit
    A rootkit replaces legitimate system files with corrupted files.
  23. What type of password-cracking programs uses characters
    numbers
  24. Which is the well-known Windows password-cracking program
    L0phtCrack
  25. What is a wrapper
    Wrappers are used to package covert programs with overt programs.

What would you like to do?

Home > Flashcards > Print Preview