1. Which of the following is used for banner grabbing?
- A) Telnet
 - B) FTP
 - C) SSH
 - D) Wireshark
 
Show Answer
2. Which of the following is used for identifying a web server OS?
- A) Telnet
 - B) Netcraft
 - C) Fragroute
 - D) Wireshark
 
Show Answer
3. Which of the following is used to perform customized network scans?
- A) Nessus
 - B) Wireshark
 - C) AirPcap
 - D) nmap
 
Show Answer
4. Which of the following is not a flag on a packet?
- A) URG
 - B) PSH
 - C) RST
 - D) END
 
Show Answer
5. An SYN attack uses which protocol?
- A) TCP
 - B) UDP
 - C) HTTP
 - D) Telnet
 
Show Answer
6. Which of the following types of attack has no flags set?
- A) SYN
 - B) NULL
 - C) Xmas tree
 - D) FIN
 
Show Answer
7. What is missing from a half-open scan?
- A) SYN
 - B) ACK
 - C) SYN-ACK
 - D) FIN
 
Show Answer
8. During an FIN scan, what indicates that a port is closed?
- A) No return response
 - B) RST
 - C) ACK
 - D) SYN
 
Show Answer
9. During a Xmas tree scan what indicates a port is closed?
- A) No return response
 - B) RST
 - C) ACK
 - D) SYN
 
Show Answer
10. What is the three-way handshake?
- A) The opening sequence of a TCP connection
 - B) A type of half-open scan
 - C) A Xmas tree scan
 - D) Part of a UDP scan
 
Show Answer
11. A full-open scan means that the three-way handshake has been completed. What is the difference between this and a half-open scan?
- A) A half-open uses TCP.
 - B) A half-open uses UDP.
 - C) A half-open does not include the final ACK.
 - D) A half-open includes the final ACK.
 
Show Answer
12. What is the sequence of the three-way handshake?
- A) SYN, SYN-ACK, ACK
 - B) SYN, SYN-ACK
 - C) SYN, ACK, SYN-ACK
 - D) SYN, ACK, ACK
 
Show Answer
13. What is an ICMP echo scan?
- A) A ping sweep
 - B) A SYN scan
 - C) A Xmas tree scan
 - D) Part of a UDP scan
 
Show Answer
14. Which best describes a vulnerability scan?
- A) A way to find open ports
 - B) A way to diagram a network
 - C) A proxy attack
 - D) A way to automate the discovery of vulnerabilities
 
Show Answer
15. What is the purpose of a proxy?
- A) To assist in scanning
 - B) To perform a scan
 - C) To keep a scan hidden
 - D) To automate the discovery of vulnerabilities
 
Show Answer
16. What is Tor used for?
- A) To hide web browsing
 - B) To hide the process of scanning
 - C) To automate scanning
 - D) To hide the banner on a system
 
Show Answer
17. Why would you need to use a proxy to perform scanning?
- A) To enhance anonymity
 - B) To fool firewalls
 - C) Perform half-open scans
 - D) To perform full-open scans
 
Show Answer
18. A vulnerability scan is a good way to do what?
- A) Find open ports
 - B) Find weaknesses
 - C) Find operating systems
 - D) Identify hardware
 
Show Answer
19. A banner can do what?
- A) Identify an OS
 - B) Help during scanning
 - C) Identify weaknesses
 - D) Identify a service
 
Show Answer
20. Nmap is required to perform what type of scan?
- A) Port scan
 - B) Vulnerability scan
 - C) Service scan
 - D) Threat scan
 
