Deck 5: Port Scanning
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 5: Port Scanning
1
A computer that receives a SYN packet from a remote computer responds to the packet with a(n) ____ packet if its port is open.
A)FIN
B)RST
C)SYN/ACK
D)ACK
A)FIN
B)RST
C)SYN/ACK
D)ACK
C
2
____ was developed to assist security testers in conducting tests on large networks and to consolidate many of the tools needed for large-scale endeavors.
A)Unicornscan
B)NetScanTools
C)Nessus
D)Nmap
A)Unicornscan
B)NetScanTools
C)Nessus
D)Nmap
A
3
The ____ relies on the OS of the attacked computer, so it's a little more risky to use than the SYN scan.
A)NULL scan
B)connect scan
C)XMAS scan
D)ACK scan
A)NULL scan
B)connect scan
C)XMAS scan
D)ACK scan
B
4
____ is a protocol packet analyzer.
A)Nmap
B)Fping
C)Tcpdump
D)Nessus
A)Nmap
B)Fping
C)Tcpdump
D)Nessus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
____, an open-source fork of Nessus, functions much like a database server, performing complex queries while the client interfaces with the server to simplify reporting and configuration.
A)Unicornscan
B)NetScanTools
C)OpenVAS
D)Nmap
A)Unicornscan
B)NetScanTools
C)OpenVAS
D)Nmap
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
____ is a reasonably priced commercial port scanner with a GUI interface.
A)AW Security Port Scanner
B)Common Vulnerabilities and Exposures
C)Ethereal
D)Tcpdump
A)AW Security Port Scanner
B)Common Vulnerabilities and Exposures
C)Ethereal
D)Tcpdump
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
A closed port can be vulnerable to an attack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
A disadvantage of Nmap is that it is very slow because it scans all the 65,000 ports of each computer in the IP address range.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Unicornscan optimizes ____ scanning beyond the capabilities of any other port scanner.
A)TCP
B)UDP
C)ICMP
D)IP
A)TCP
B)UDP
C)ICMP
D)IP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The ____ tool was originally written for Phrack magazine in 1997 by Fyodor.
A)Unicornscan
B)Fping
C)Nessus
D)Nmap
A)Unicornscan
B)Fping
C)Nessus
D)Nmap
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Port scanning is a method of finding out which services a host computer offers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
When a TCP three-way handshake ends, both parties send a(n) ____ packet to end the connection.
A)SYN
B)ACK
C)FIN
D)RST
A)SYN
B)ACK
C)FIN
D)RST
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Closed ports respond to a(n) ____ with an RST packet.
A)XMAS scan
B)SYN scan
C)Connect scan
D)ACK scan
A)XMAS scan
B)SYN scan
C)Connect scan
D)ACK scan
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
You can search for known vulnerabilities in a host computer by using the Common Vulnerabilities and Exposures Web site.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
____ is currently the standard port-scanning tool for security professionals.
A)Unicornscan
B)Fping
C)Nessus
D)Nmap
A)Unicornscan
B)Fping
C)Nessus
D)Nmap
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
HTTP uses port ____ to connect to a Web service.
A)21
B)22
C)25
D)80
A)21
B)22
C)25
D)80
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ option of Nmap is used to perform a TCP SYN stealth port scan.
A)-sS
B)-sU
C)-sV
D)-S
A)-sS
B)-sU
C)-sV
D)-S
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
With the ____ tool, you can ping multiple IP addresses simultaneously.
A)Fping
B)Nmap
C)Nessus
D)Unicornscan
A)Fping
B)Nmap
C)Nessus
D)Unicornscan
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
A closed port responds to a SYN scan with an RST packet, so if no packet is received, the best guess is that the port is open.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be "____".
A)open
B)closed
C)unfiltered
D)unassigned
A)open
B)closed
C)unfiltered
D)unassigned
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
An OpenVAS____________________ is a security test program (script) that can be selected from the client interface.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to ____________________ the range of IP addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
might indicate that a firewall is being used
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
might indicate that a firewall is being used
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Many security testers use the ____ tool to bypass filtering devices by injecting modified IP packets.
A)Tcpdump
B)Hping
C)Nmap
D)Nessus
A)Tcpdump
B)Hping
C)Nmap
D)Nessus
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
typically used to get past a firewall
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
typically used to get past a firewall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
in this type of scan, the FIN, PSH, and URG flags are set
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
in this type of scan, the FIN, PSH, and URG flags are set
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
The ____ tool enables you to craft an IP packet to your liking.
A)Unicornscan
B)Hping
C)Nmap
D)Ethereal
A)Unicornscan
B)Hping
C)Nmap
D)Ethereal
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks, so they use ____________________ attacks that are more difficult to detect.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A ____ or batch file is a text file containing multiple commands that are normally entered manually at the command prompt.
A)script
B)program
C)snippet
D)signature
A)script
B)program
C)snippet
D)signature
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
In any *NIX system, after saving a script, you need to make it executable so that you can run it. From the command line, type ____.
A)chmod +execute script_name
B)chmod +x script_name
C)chmod -execute script_name
D)chmod -x script_name
A)chmod +execute script_name
B)chmod +x script_name
C)chmod -execute script_name
D)chmod -x script_name
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Nmap has a GUI version called ____________________ that makes it easier to work with some of the more complex options.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Port scanners can also be used to conduct a(n) ____________________ of a large network to identify which IP addresses belong to active hosts.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What makes the ____________________ tool unique is the ability to update security check plug-ins when they become available.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
MATCHING
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
similar to the SYN scan, except that it does complete the three-way handshake
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
similar to the SYN scan, except that it does complete the three-way handshake
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
MATCHING
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
allows access to applications
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
allows access to applications
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
MATCHING
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
operates on ports 65301, 22, 5631, and 5632
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
operates on ports 65301, 22, 5631, and 5632
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The ____ vi command deletes the current line.
A)d
B)dl
C)dd
D)dw
A)d
B)dl
C)dd
D)dw
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
MATCHING
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
TCP scan with all the packet flags are turned off
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
TCP scan with all the packet flags are turned off
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
In a Linux script, the line ____ is important because it identifies the file as a script.
A)#!/bin/sh
B)#!/bin/script
C)#!/bin/shscript
D)#!/bin/sc
A)#!/bin/sh
B)#!/bin/script
C)#!/bin/shscript
D)#!/bin/sc
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
MATCHING
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
does not allow entry or access to a service
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
does not allow entry or access to a service
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Why is port scanning useful for hackers?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
MATCHING
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
a port scanning tool
Match each term with the correct statement below.
a.Nmap
f.ACK scan
b.pcAnywhere
g.filtered port
c.XMAS scan
h.open port
d.connect scan
i.NULL scan
e.closed port
a port scanning tool
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are the problems on depending on ping sweeps to find out which hosts are "live"?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
If subnetting is used in an organization, you can include the broadcast address by mistake when performing ping sweeps. How might this happen?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is a UDP scan?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What makes the OpenVAS tool unique?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Why is it important for you as a security tester to understand and be able to create scripts?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
How does a SYN scan work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Why is port scanning considered legal by most security testers and hackers?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Which ports should security professionals scan when doing a test? Why?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck