29 Questions
1 Views
3.3 Stars

Nmap and Snort Command Line Quiz

Test your knowledge of network scanning and intrusion detection system commands with this quiz. Questions cover Nmap commands for port scanning and Snort commands for network intrusion detection setup. See how well you know the commands and parameters for these tools!

Created by
@UnmatchedTeal
1/29
Find out if you were right!
Create an account to continue playing and access all the benefits such as generating your own quizzes, flashcards and much more!
Quiz Team

Access to a Library of 520,000+ Quizzes & Flashcards

Explore diverse subjects like math, history, science, literature and more in our expanding catalog.

Questions and Answers

Who are the primary victims of SMURF attacks on the Internet?

IRC servers

What type of attacks target DNS servers directly?

DNS cache poisoning attacks

TCP/IP session hijacking is carried out in which OSI layer?

Transport layer

What is the term used in serving different types of web pages based on the user’s IP address?

<p>Website cloaking</p> Signup and view all the answers

True or False: Data is sent over the network as cleartext (unencrypted) when Basic Authentication is configured on web servers.

<p>True</p> Signup and view all the answers

What is the countermeasure against XSS scripting?

<p>Replace &lt; and &gt; characters with &lt; and &gt; using server scripts</p> Signup and view all the answers

What is the main reason provided in the text for disabling LM authentication in Windows XP?

<p>To enhance security as it is weaker and vulnerable to attacks</p> Signup and view all the answers

If you want to view only packets sent from 10.0.0.22 in Ethereal, what filter should you apply?

<p>ip.src == 10.0.0.22</p> Signup and view all the answers

What does the FIN in a TCP flag define?

<p>Used to close a TCP connection</p> Signup and view all the answers

What does ICMP (type 11, code 0) denote?

<p>Time Exceeded</p> Signup and view all the answers

Which of the following statements best describes a white-hat hacker?

<p>Security professional</p> Signup and view all the answers

What is the first phase of hacking?

<p>Reconnaissance</p> Signup and view all the answers

What is the purpose of the 'nmap' command with the flags '-sX -p 22,53,110,143,4564 198.116.*.1-127'?

<p>Scan for open ports on specific IP addresses</p> Signup and view all the answers

Which C/C++ function is notorious for not performing bound checks and is a common source of buffer overflow vulnerabilities?

<p>gets()</p> Signup and view all the answers

How can SMB hijacking be prevented in Windows operating systems?

<p>Disable NetBIOS over TCP/IP in Windows NT and 2000</p> Signup and view all the answers

Who represents the highest risk to your network among the following types of hackers?

<p>Black-hat hackers</p> Signup and view all the answers

Which command-line switch would you use for OS detection in Nmap?

<p>-O</p> Signup and view all the answers

How can you compromise a system that relies on cookie-based security?

<p>Intercept the communication between the client and the server and change the cookie to make the server believe there is a user with higher privileges.</p> Signup and view all the answers

What action should be taken before using Windows to enhance security?

<p>Make sure a new installation of Windows is patched by installing the latest service packs.</p> Signup and view all the answers

What should be done to enhance Windows security immediately upon installation?

<p>Create a non-admin user with a complex password and log onto this account.</p> Signup and view all the answers

How could you bypass standard authentication on a VPN?

<p>Implement biometric authentication instead of standard authentication for VPN access.</p> Signup and view all the answers

How can an attacker gain higher-level privileges in a system protected by cookies?

<p>Delete the cookie, reestablish connection to the server, and access higher-level privileges.</p> Signup and view all the answers

What action would significantly enhance VPN security?

<p>Enable a 25-character complex password policy for VPN access.</p> Signup and view all the answers

Who poses the most threat to an organization's security?

<p>Black-hat hacker</p> Signup and view all the answers

Which of the following should be included in an ethical hacking report?

<p>Findings of the test</p> Signup and view all the answers

What are the four regional Internet registries?

<p>APNIC, PICNIC, NANIC, ARIN</p> Signup and view all the answers

Which tool is used for performing footprinting undetected?

<p>Whois search</p> Signup and view all the answers

What is the next immediate step after footprinting?

<p>Scanning</p> Signup and view all the answers

How does traceroute work?

<p>It sends a specially crafted IP packet to a router to locate the number of hops from the sender to the destination network.</p> Signup and view all the answers

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Use Quizgecko on...
Browser
Browser