Total No. of Questions = 20

1. Which of the following is used for banner grabbing?

  • A) Telnet
  • B) FTP
  • C) SSH
  • D) Wireshark

Show Answer

The Correct Answer is:- A

2. Which of the following is used for identifying a web server OS?

  • A) Telnet
  • B) Netcraft
  • C) Fragroute
  • D) Wireshark

Show Answer

The Correct Answer is:- B

3. Which of the following is used to perform customized network scans?

  • A) Nessus
  • B) Wireshark
  • C) AirPcap
  • D) nmap

Show Answer

The Correct Answer is:- D

4. Which of the following is not a flag on a packet?

  • A) URG
  • B) PSH
  • C) RST
  • D) END

Show Answer

The Correct Answer is:- D

5. An SYN attack uses which protocol?

  • A) TCP
  • B) UDP
  • C) HTTP
  • D) Telnet

Show Answer

The Correct Answer is:- A

6. Which of the following types of attack has no flags set?

  • A) SYN
  • B) NULL
  • C) Xmas tree
  • D) FIN

Show Answer

The Correct Answer is:- B

7. What is missing from a half-open scan?

  • A) SYN
  • B) ACK
  • C) SYN-ACK
  • D) FIN

Show Answer

The Correct Answer is:- B

8. During an FIN scan, what indicates that a port is closed?

  • A) No return response
  • B) RST
  • C) ACK
  • D) SYN

Show Answer

The Correct Answer is:- B

9. During a Xmas tree scan what indicates a port is closed?

  • A) No return response
  • B) RST
  • C) ACK
  • D) SYN

Show Answer

The Correct Answer is:- B

10. What is the three-way handshake?

  • A) The opening sequence of a TCP connection
  • B) A type of half-open scan
  • C) A Xmas tree scan
  • D) Part of a UDP scan

Show Answer

The Correct Answer is:- A

11. A full-open scan means that the three-way handshake has been completed. What is the difference between this and a half-open scan?

  • A) A half-open uses TCP.
  • B) A half-open uses UDP.
  • C) A half-open does not include the final ACK.
  • D) A half-open includes the final ACK.

Show Answer

The Correct Answer is:- C

12. What is the sequence of the three-way handshake?

  • A) SYN, SYN-ACK, ACK
  • B) SYN, SYN-ACK
  • C) SYN, ACK, SYN-ACK
  • D) SYN, ACK, ACK

Show Answer

The Correct Answer is:- A

13. What is an ICMP echo scan?

  • A) A ping sweep
  • B) A SYN scan
  • C) A Xmas tree scan
  • D) Part of a UDP scan

Show Answer

The Correct Answer is:- A

14. Which best describes a vulnerability scan?

  • A) A way to find open ports
  • B) A way to diagram a network
  • C) A proxy attack
  • D) A way to automate the discovery of vulnerabilities

Show Answer

The Correct Answer is:- D

15. What is the purpose of a proxy?

  • A) To assist in scanning
  • B) To perform a scan
  • C) To keep a scan hidden
  • D) To automate the discovery of vulnerabilities

Show Answer

The Correct Answer is:- C

16. What is Tor used for?

  • A) To hide web browsing
  • B) To hide the process of scanning
  • C) To automate scanning
  • D) To hide the banner on a system

Show Answer

The Correct Answer is:- B

17. Why would you need to use a proxy to perform scanning?

  • A) To enhance anonymity
  • B) To fool firewalls
  • C) Perform half-open scans
  • D) To perform full-open scans

Show Answer

The Correct Answer is:- A

18. A vulnerability scan is a good way to do what?

  • A) Find open ports
  • B) Find weaknesses
  • C) Find operating systems
  • D) Identify hardware

Show Answer

The Correct Answer is:- A

19. A banner can do what?

  • A) Identify an OS
  • B) Help during scanning
  • C) Identify weaknesses
  • D) Identify a service

Show Answer

The Correct Answer is:- D

20. Nmap is required to perform what type of scan?

  • A) Port scan
  • B) Vulnerability scan
  • C) Service scan
  • D) Threat scan

Show Answer

The Correct Answer is:- A