Network Security Tools Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the correct operator to use to find all pages with the words SQL and version in their titles?

  • allintitle: SQL version (correct)
  • inurl: SQL version
  • allinurl: SQL version
  • inurl: SQL inurl: version

Which of the following is not an internet research tool?

  • Google cloud
  • Webpages
  • Maltego
  • Azure (correct)

How can the access to more secure content be granted to clients with an internal IP address compared to those with external IP addresses?

  • Using DNS servers
  • Using IPs
  • Using user IP groups (correct)
  • Using split DNS

What information gathering technique is Sarah using when she befriends an employee to learn their personal details?

<p>Social engineering (A)</p> Signup and view all the answers

Dan wants to protect his DNS service from reconnaissance. What action should he take?

<p>Monitor DNS logs for unusual queries (C)</p> Signup and view all the answers

What could be a potential consequence if reconnaissance tools are used excessively?

<p>Increased vulnerability to attacks (A)</p> Signup and view all the answers

What encryption formats should be used to store usernames and passwords securely?

<p>LM and NTLM hash (C)</p> Signup and view all the answers

What does the command 'lastlog' typically show?

<p>The last time a user logged in (C)</p> Signup and view all the answers

Which port is commonly used for zone transfers to access information?

<p>TCP 53 (B)</p> Signup and view all the answers

How can a Lightweight Directory Access Protocol (LDAP) be efficiently hardened?

<p>Block port 389 (C)</p> Signup and view all the answers

Which tool is best suited to protect customer data, prevent unwanted app privileges, and avoid connectivity issues?

<p>Nessus (D)</p> Signup and view all the answers

Which of the following provides a list of resolved vulnerabilities?

<p>Security vulnerability summary (A)</p> Signup and view all the answers

What action should be taken to limit the sharing of critical information?

<p>Information policy (B)</p> Signup and view all the answers

When sending packets between computers to indicate that you are done sending information, which flag should you send?

<p>FIN (B)</p> Signup and view all the answers

In network infrastructure security, which evasion technique involves splitting packets?

<p>Fragmenting (D)</p> Signup and view all the answers

Which online tool is commonly used to obtain server and web server information?

<p>Netcraft (A)</p> Signup and view all the answers

In an Xmas tree scan, which TCP flag will be sent if the port is closed?

<p>RST (C)</p> Signup and view all the answers

Which tool is used for banner grabbing that returns information about the operating system in a stealthy manner?

<p>P0f (B)</p> Signup and view all the answers

When a hacker finds a target machine but uses another disposable system to take the blame, what type of port scan is typically being employed?

<p>Full open scan (D)</p> Signup and view all the answers

Which port number is typically used to obtain a snippet of information from a target system?

<p>23 (C)</p> Signup and view all the answers

What best describes Telnet?

<p>A tool for banner grabbing that operates on port 23 (A)</p> Signup and view all the answers

During which phase of the ethical hacking process do you gather information about system configurations, software, and services?

<p>Reconnaissance (A)</p> Signup and view all the answers

How do you scan all ports on a system using SuperScan?

<p>ScallAll (D)</p> Signup and view all the answers

What type of assessment can MTN SA begin with for a complete security assessment of critical infrastructure, considering the nature of the business?

<p>Internal (B)</p> Signup and view all the answers

Which best describes active sniffing in a security assessment context?

<p>Active sniffing is harder to detect than passive sniffing (D)</p> Signup and view all the answers

In which assessment tool is data always encrypted at rest and in transit?

<p>Qualys (A)</p> Signup and view all the answers

In which phase of the vulnerability management life cycle is Isabel working when she creates a report with findings and recommendations?

<p>Remediation (D)</p> Signup and view all the answers

What type of assessment solutions should an organisation consider when top management feels they are not equipped to handle security and protection?

<p>Penetration testing (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Use Quizgecko on...
Browser
Browser