1. Which of the following is used for banner grabbing?
- A) Telnet
- B) FTP
- C) SSH
- D) Wireshark
Show Answer
2. Which of the following is used for identifying a web server OS?
- A) Telnet
- B) Netcraft
- C) Fragroute
- D) Wireshark
Show Answer
3. Which of the following is used to perform customized network scans?
- A) Nessus
- B) Wireshark
- C) AirPcap
- D) nmap
Show Answer
4. Which of the following is not a flag on a packet?
- A) URG
- B) PSH
- C) RST
- D) END
Show Answer
5. An SYN attack uses which protocol?
- A) TCP
- B) UDP
- C) HTTP
- D) Telnet
Show Answer
6. Which of the following types of attack has no flags set?
- A) SYN
- B) NULL
- C) Xmas tree
- D) FIN
Show Answer
7. What is missing from a half-open scan?
- A) SYN
- B) ACK
- C) SYN-ACK
- D) FIN
Show Answer
8. During an FIN scan, what indicates that a port is closed?
- A) No return response
- B) RST
- C) ACK
- D) SYN
Show Answer
9. During a Xmas tree scan what indicates a port is closed?
- A) No return response
- B) RST
- C) ACK
- D) SYN
Show Answer
10. What is the three-way handshake?
- A) The opening sequence of a TCP connection
- B) A type of half-open scan
- C) A Xmas tree scan
- D) Part of a UDP scan
Show Answer
11. A full-open scan means that the three-way handshake has been completed. What is the difference between this and a half-open scan?
- A) A half-open uses TCP.
- B) A half-open uses UDP.
- C) A half-open does not include the final ACK.
- D) A half-open includes the final ACK.
Show Answer
12. What is the sequence of the three-way handshake?
- A) SYN, SYN-ACK, ACK
- B) SYN, SYN-ACK
- C) SYN, ACK, SYN-ACK
- D) SYN, ACK, ACK
Show Answer
13. What is an ICMP echo scan?
- A) A ping sweep
- B) A SYN scan
- C) A Xmas tree scan
- D) Part of a UDP scan
Show Answer
14. Which best describes a vulnerability scan?
- A) A way to find open ports
- B) A way to diagram a network
- C) A proxy attack
- D) A way to automate the discovery of vulnerabilities
Show Answer
15. What is the purpose of a proxy?
- A) To assist in scanning
- B) To perform a scan
- C) To keep a scan hidden
- D) To automate the discovery of vulnerabilities
Show Answer
16. What is Tor used for?
- A) To hide web browsing
- B) To hide the process of scanning
- C) To automate scanning
- D) To hide the banner on a system
Show Answer
17. Why would you need to use a proxy to perform scanning?
- A) To enhance anonymity
- B) To fool firewalls
- C) Perform half-open scans
- D) To perform full-open scans
Show Answer
18. A vulnerability scan is a good way to do what?
- A) Find open ports
- B) Find weaknesses
- C) Find operating systems
- D) Identify hardware
Show Answer
19. A banner can do what?
- A) Identify an OS
- B) Help during scanning
- C) Identify weaknesses
- D) Identify a service
Show Answer
20. Nmap is required to perform what type of scan?
- A) Port scan
- B) Vulnerability scan
- C) Service scan
- D) Threat scan