Filters
Question type

Study Flashcards

What type of port scan has the FIN,PSH,and URG flags set?


A) NULL scan
B) connect scan
C) XMAS scan
D) ACK scan

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

If an attacker decides to implement a less obvious port-scan,or stealth attack,which of the following techniques would be appropriate to make their activities more difficult to detect?


A) increase their scan speeds
B) limit their tool set
C) increase their scan speeds.
D) limit their scan speeds

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

When writing a script which statement allows you to avoid creating an endless loop in your script?


A) count
B) while
C) bin
D) do

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Nmap has a GUI front end that makes it easier to work with some of the complex options by providing a GUI.Which of the following is the Nmap GUI front end?


A) Nmap GUI
B) Fping
C) Zenmap
D) Hping

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

In a Linux script,which of the lines is important because it identifies the file as a script?


A) #!/bin/sh
B) #!/bin/script
C) #!/bin/shscript
D) #!/bin/sc

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

When a TCP three-way handshake ends,both parties send what type of packet to end the connection?


A) SYN
B) ACK
C) FIN
D) RST

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

When using the text editor vim what command appends text after the insertion point?


A) X
B) A
C) Delete Key
D) ZZ

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Closed ports respond to a NULL scan with what type of packet?


A) RST
B) SYN
C) Ping
D) ACK

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?


A) Hping
B) NetTools
C) Nessus
D) Nmap

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

An open port allows access to specific applications and cannot be vulnerable to attack.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer