1/47
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which process enables you to see all the host computers on a network and basically give you a diagram of an organization's network?
zone transfers
To see additional parameters that can be used with the Netcat command, what should you type at the command prompt?
nc -h
Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?
stealth
Port scanning is a method of finding out which services a host computer offers.
True or False
True
Which HTTP error informs you the server understands the request but refuses to comply?
403 Forbidden
In a normal TCP session, the sender sends a packet to another computer with which of the following flags set?
SYN flag
Closed ports respond to a NULL scan with what type of packet?
RST
Which statement is where the script performs its main task?
do
The HTTP CONNECT method starts a remote application-layer loopback of the request message.
True or False
False
Which HTTP method requests that the entity is stored under the Request-URI?
PUT
In a NULL scan, all packet flags are turned on.
True or False
False
When an individual attempts to discover as much information legally possible about their competition, what information gathering technique are they performing?
competitive intelligence
Which utility can extract meta-data and documents on a Website to reveal the document creator's network login, e-mail address, IP address, and other important information?
FOCA
What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?
Hping
An open port allows access to specific applications and cannot be vulnerable to attack.
True or False
False
Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?
script
What area of a network is a major area of potential vulnerability because of the use of URLs?
DNS
Nmap has a GUI front end that makes it easier to work with some of the complex options by providing a GUI. Which of the following is the Nmap GUI front end?
Zenmap
In a Linux script, which of the lines is important because it identifies the file as a script?
#!/bin/sh
When using a port-scanner, what procedure can be conducted to identify which IP addresses belong to active hosts?
ping sweep
What 1-pixel x 1-pixel image file is referenced in an html tag, and usually works with a cookie to collect information about the person visiting the Website?
Web bug
Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?
card access
Wget is a *nix system command that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet.
True or False
True
Attackers typically use ACK scans to get past a firewall or other filtering devices.
True or False
True
What type of port scan is similar to a SYN scan and is risky to use because it relies on the attacked computer's OS?
Connect
Network attacks can often begin by gathering information from a company's Web site.
True or False
True
What tool can be used to read and write data to ports over a network?
Netcat
Which of the following describes a flexible program that automates a task that takes too much time to perform manually?
customized script
One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?
reply
What type of port scan has the FIN, PSH, and URG flags set?
XMAS scan
Which of the following is a text file generated by a Web server and stored on a user's browser?
cookie
What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?
OpenVAS
What HTTP method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body?
HEAD
If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?
limit their scan speeds
What utility can be used to intercept detailed information from a company's Web site?
Zed Attack Proxy
You can search for vulnerabilities in a host computer by using a port-scanning tool.
True or False
True
In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be operating in what state?
unfiltered
Walking is an automated way to discover pages of a Web site by following links.
True or False
False
When a TCP three-way handshake ends, both parties send what type of packet to end the connection?
FIN
A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?
social engineering
Which utility is used to gather IP and domain information?
Whois
What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?
NMap
What is the HTTP method that retrieves data by URI?
GET
In any *NIX system, after saving a script named "script_name," you need to make it executable so that you can run it. Which command will accomplish this task from the command line?
chmod +x script_name
Which of the following sometimes displays a banner that notifies the user of its presence?
Adware
When security professionals create a packet, they may choose to specifically set which of the following fields to help initiate a response from a target computer?
flag
What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses?
Fping
Which HTTP method starts a remote Application-layer loopback of the request message?
TRACE