FC 2 -50.txt
Card Set Information
FC 2 -50.txt
What ICMP code is used in a ping command
ICMP Echo request uses code 8 and Echo Reply uses 0.
True or false: You can run a null scan against Windows systems
False. Running null scans on Windows systems produces incorrect results.
How do you detect the type of OS and application running on a remote server
Telnet to the open port
What port-scanning system uses IPIDs
True or false: UDP is a connection-oriented protocol
What is the default password used by SNMP
What is the ICMP message type for "destination unreachable"
What response will you get for a FIN scan when the port is closed
What response will you get for a FIN scan when the port is open
List the two types of hacking attacks.answer
Active attack and passive attack
What response will you get for an XMAS scan when the port is closed
What response will you get for an XMAS scan when the port is open
Which type of Nmap scan is most reliable
Which organization investigates computer crimes in the United States
National Infrastructure Protection Center (NIPC)
What service listens on port 139
True or false: SNMPv1
the community string
What part of SID is used for the Administrator account
Which tool can you use for zone transfer
What ports do you block to prevent NetBIOS traffic from entering the network
What encryption algorithm does a LAN Manager (LM) use
How do you view old versions of web pages
Visit www.archive.org (the Wayback Machine).
What is a rootkit
A rootkit replaces legitimate system files with corrupted files.
What type of password-cracking programs uses characters
Which is the well-known Windows password-cracking program
What is a wrapper
Wrappers are used to package covert programs with overt programs.