Network Security Tools Quiz
28 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the correct operator to use to find all pages with the words SQL and version in their titles?

  • allintitle: SQL version (correct)
  • inurl: SQL version
  • allinurl: SQL version
  • inurl: SQL inurl: version

Which of the following is not an internet research tool?

  • Google cloud
  • Webpages
  • Maltego
  • Azure (correct)

How can the access to more secure content be granted to clients with an internal IP address compared to those with external IP addresses?

  • Using DNS servers
  • Using IPs
  • Using user IP groups (correct)
  • Using split DNS

What information gathering technique is Sarah using when she befriends an employee to learn their personal details?

<p>Social engineering (A)</p> Signup and view all the answers

Dan wants to protect his DNS service from reconnaissance. What action should he take?

<p>Monitor DNS logs for unusual queries (C)</p> Signup and view all the answers

What could be a potential consequence if reconnaissance tools are used excessively?

<p>Increased vulnerability to attacks (A)</p> Signup and view all the answers

What encryption formats should be used to store usernames and passwords securely?

<p>LM and NTLM hash (C)</p> Signup and view all the answers

What does the command 'lastlog' typically show?

<p>The last time a user logged in (C)</p> Signup and view all the answers

Which port is commonly used for zone transfers to access information?

<p>TCP 53 (B)</p> Signup and view all the answers

How can a Lightweight Directory Access Protocol (LDAP) be efficiently hardened?

<p>Block port 389 (C)</p> Signup and view all the answers

Which tool is best suited to protect customer data, prevent unwanted app privileges, and avoid connectivity issues?

<p>Nessus (D)</p> Signup and view all the answers

Which of the following provides a list of resolved vulnerabilities?

<p>Security vulnerability summary (A)</p> Signup and view all the answers

What action should be taken to limit the sharing of critical information?

<p>Information policy (B)</p> Signup and view all the answers

When sending packets between computers to indicate that you are done sending information, which flag should you send?

<p>FIN (B)</p> Signup and view all the answers

In network infrastructure security, which evasion technique involves splitting packets?

<p>Fragmenting (D)</p> Signup and view all the answers

Which online tool is commonly used to obtain server and web server information?

<p>Netcraft (A)</p> Signup and view all the answers

In an Xmas tree scan, which TCP flag will be sent if the port is closed?

<p>RST (C)</p> Signup and view all the answers

Which tool is used for banner grabbing that returns information about the operating system in a stealthy manner?

<p>P0f (B)</p> Signup and view all the answers

When a hacker finds a target machine but uses another disposable system to take the blame, what type of port scan is typically being employed?

<p>Full open scan (D)</p> Signup and view all the answers

Which port number is typically used to obtain a snippet of information from a target system?

<p>23 (C)</p> Signup and view all the answers

What best describes Telnet?

<p>A tool for banner grabbing that operates on port 23 (A)</p> Signup and view all the answers

During which phase of the ethical hacking process do you gather information about system configurations, software, and services?

<p>Reconnaissance (A)</p> Signup and view all the answers

How do you scan all ports on a system using SuperScan?

<p>ScallAll (D)</p> Signup and view all the answers

What type of assessment can MTN SA begin with for a complete security assessment of critical infrastructure, considering the nature of the business?

<p>Internal (B)</p> Signup and view all the answers

Which best describes active sniffing in a security assessment context?

<p>Active sniffing is harder to detect than passive sniffing (D)</p> Signup and view all the answers

In which assessment tool is data always encrypted at rest and in transit?

<p>Qualys (A)</p> Signup and view all the answers

In which phase of the vulnerability management life cycle is Isabel working when she creates a report with findings and recommendations?

<p>Remediation (D)</p> Signup and view all the answers

What type of assessment solutions should an organisation consider when top management feels they are not equipped to handle security and protection?

<p>Penetration testing (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser