Mastering Network Routing and Packet Forwarding
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following best describes the purpose of network vulnerability scanning?

  • To track applications at scale around the world
  • To exploit known vulnerabilities
  • To identify mistakes in an organization's network (correct)
  • To find potential victims for attackers

What is the main function of a network vulnerability scanner?

  • To connect to a server and check for outdated applications
  • To confirm the existence of a vulnerability (correct)
  • To exploit known vulnerabilities
  • To find potential victims for attackers

What is the role of the Shodan search engine?

  • To exploit known vulnerabilities
  • To identify vulnerabilities in an organization's network
  • To catalog scan results of internet-connected devices (correct)
  • To find potential victims for attackers

Why are network vulnerability scans of interest to both organizations and attackers?

<p>To find potential victims for attackers (D)</p> Signup and view all the answers

What does the Shodan search engine claim to be?

<p>A search engine for internet-connected devices (C)</p> Signup and view all the answers

How can network vulnerability scans be used to remediate vulnerabilities?

<p>By identifying mistakes in an organization's network (D)</p> Signup and view all the answers

What type of records does the Shodan search engine store?

<p>Records of collected scan results (D)</p> Signup and view all the answers

What is the purpose of running periodic network vulnerability scans?

<p>To identify mistakes in an organization's network (D)</p> Signup and view all the answers

What action does a network vulnerability scanner take if an application is running an outdated version with a known vulnerability?

<p>It confirms the existence of the vulnerability (C)</p> Signup and view all the answers

What is the significance of the Shodan search engine for security researchers?

<p>To access a vast catalogue of scan results (A)</p> Signup and view all the answers

Which technique is an essential part of network administration and network analysis at organizations?

<p>Technical scanning (D)</p> Signup and view all the answers

What does a ping test involve?

<p>Sending an ICMP packet to a target machine (C)</p> Signup and view all the answers

What does a ping test indicate if the target machine replies with an echo reply packet?

<p>The target machine is active and switched on (B)</p> Signup and view all the answers

What is the purpose of technical scanning during the reconnaissance stage of an attack?

<p>To collect information about the technical configuration (A)</p> Signup and view all the answers

What information does a ping test provide?

<p>The status of a machine (C)</p> Signup and view all the answers

What is the outbound packet called in a ping test?

<p>Echo request packet (D)</p> Signup and view all the answers

What is a packet?

<p>A small amount of formatted data (A)</p> Signup and view all the answers

What does the "time to live" (TTL) property indicate in a packet?

<p>How far into a network the machine is located (D)</p> Signup and view all the answers

Which technique is commonly used by organizations to debug networking issues?

<p>Ping test (B)</p> Signup and view all the answers

What details about a target machine can be obtained through technical scanning?

<p>Services running on the machine, operating system in use, vulnerabilities of services (C)</p> Signup and view all the answers

Which of the following statements is true about the 'time to live' (TTL) in a packet?

<p>The TTL is decreased by one at each router it passes through. (B)</p> Signup and view all the answers

What can be determined by performing a traceroute between two computers?

<p>The number of devices on a network. (D)</p> Signup and view all the answers

Which command can be used to start a ping test on Windows machines?

<p>ping target_name (D)</p> Signup and view all the answers

What is the purpose of port scanning?

<p>To identify open ports on a target machine. (C)</p> Signup and view all the answers

Which of the following is true about "well known" ports?

<p>They are the first 1,024 ports in the TCP protocol. (D)</p> Signup and view all the answers

What is the main purpose of vulnerability scanning?

<p>To determine if a vulnerability exists on a target system. (A)</p> Signup and view all the answers

Which method of vulnerability scanning involves comparing software version numbers against a database?

<p>Database scanning (D)</p> Signup and view all the answers

What is the potential risk of dynamic scanning in vulnerability scanning?

<p>It may perform illegal actions in certain countries. (A)</p> Signup and view all the answers

Which statement is true about a network vulnerability scan?

<p>It requires the owner's consent before scanning a target. (D)</p> Signup and view all the answers

Which protocol is commonly used for web-based applications?

<p>HTTP (C)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser