Network Security Tools Quiz
28 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the correct operator to use to find all pages with the words SQL and version in their titles?

  • allintitle: SQL version (correct)
  • inurl: SQL version
  • allinurl: SQL version
  • inurl: SQL inurl: version
  • Which of the following is not an internet research tool?

  • Google cloud
  • Webpages
  • Maltego
  • Azure (correct)
  • How can the access to more secure content be granted to clients with an internal IP address compared to those with external IP addresses?

  • Using DNS servers
  • Using IPs
  • Using user IP groups (correct)
  • Using split DNS
  • What information gathering technique is Sarah using when she befriends an employee to learn their personal details?

    <p>Social engineering</p> Signup and view all the answers

    Dan wants to protect his DNS service from reconnaissance. What action should he take?

    <p>Monitor DNS logs for unusual queries</p> Signup and view all the answers

    What could be a potential consequence if reconnaissance tools are used excessively?

    <p>Increased vulnerability to attacks</p> Signup and view all the answers

    What encryption formats should be used to store usernames and passwords securely?

    <p>LM and NTLM hash</p> Signup and view all the answers

    What does the command 'lastlog' typically show?

    <p>The last time a user logged in</p> Signup and view all the answers

    Which port is commonly used for zone transfers to access information?

    <p>TCP 53</p> Signup and view all the answers

    How can a Lightweight Directory Access Protocol (LDAP) be efficiently hardened?

    <p>Block port 389</p> Signup and view all the answers

    Which tool is best suited to protect customer data, prevent unwanted app privileges, and avoid connectivity issues?

    <p>Nessus</p> Signup and view all the answers

    Which of the following provides a list of resolved vulnerabilities?

    <p>Security vulnerability summary</p> Signup and view all the answers

    What action should be taken to limit the sharing of critical information?

    <p>Information policy</p> Signup and view all the answers

    When sending packets between computers to indicate that you are done sending information, which flag should you send?

    <p>FIN</p> Signup and view all the answers

    In network infrastructure security, which evasion technique involves splitting packets?

    <p>Fragmenting</p> Signup and view all the answers

    Which online tool is commonly used to obtain server and web server information?

    <p>Netcraft</p> Signup and view all the answers

    In an Xmas tree scan, which TCP flag will be sent if the port is closed?

    <p>RST</p> Signup and view all the answers

    Which tool is used for banner grabbing that returns information about the operating system in a stealthy manner?

    <p>P0f</p> Signup and view all the answers

    When a hacker finds a target machine but uses another disposable system to take the blame, what type of port scan is typically being employed?

    <p>Full open scan</p> Signup and view all the answers

    Which port number is typically used to obtain a snippet of information from a target system?

    <p>23</p> Signup and view all the answers

    What best describes Telnet?

    <p>A tool for banner grabbing that operates on port 23</p> Signup and view all the answers

    During which phase of the ethical hacking process do you gather information about system configurations, software, and services?

    <p>Reconnaissance</p> Signup and view all the answers

    How do you scan all ports on a system using SuperScan?

    <p>ScallAll</p> Signup and view all the answers

    What type of assessment can MTN SA begin with for a complete security assessment of critical infrastructure, considering the nature of the business?

    <p>Internal</p> Signup and view all the answers

    Which best describes active sniffing in a security assessment context?

    <p>Active sniffing is harder to detect than passive sniffing</p> Signup and view all the answers

    In which assessment tool is data always encrypted at rest and in transit?

    <p>Qualys</p> Signup and view all the answers

    In which phase of the vulnerability management life cycle is Isabel working when she creates a report with findings and recommendations?

    <p>Remediation</p> Signup and view all the answers

    What type of assessment solutions should an organisation consider when top management feels they are not equipped to handle security and protection?

    <p>Penetration testing</p> Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser