Nmap and Snort Command Line Quiz
29 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Who are the primary victims of SMURF attacks on the Internet?

  • Mail servers
  • IRC servers (correct)
  • IDS devices
  • SPAM filters
  • What type of attacks target DNS servers directly?

  • DNS cache poisoning attacks (correct)
  • DNS reverse connection attacks
  • DNS reflector and amplification attack
  • DNS forward lookup attacks
  • TCP/IP session hijacking is carried out in which OSI layer?

  • Transport layer (correct)
  • Datalink layer
  • Physical layer
  • Network layer
  • What is the term used in serving different types of web pages based on the user’s IP address?

    <p>Website cloaking</p> Signup and view all the answers

    True or False: Data is sent over the network as cleartext (unencrypted) when Basic Authentication is configured on web servers.

    <p>True</p> Signup and view all the answers

    What is the countermeasure against XSS scripting?

    <p>Replace &lt; and &gt; characters with &lt; and &gt; using server scripts</p> Signup and view all the answers

    What is the main reason provided in the text for disabling LM authentication in Windows XP?

    <p>To enhance security as it is weaker and vulnerable to attacks</p> Signup and view all the answers

    If you want to view only packets sent from 10.0.0.22 in Ethereal, what filter should you apply?

    <p>ip.src == 10.0.0.22</p> Signup and view all the answers

    What does the FIN in a TCP flag define?

    <p>Used to close a TCP connection</p> Signup and view all the answers

    What does ICMP (type 11, code 0) denote?

    <p>Time Exceeded</p> Signup and view all the answers

    Which of the following statements best describes a white-hat hacker?

    <p>Security professional</p> Signup and view all the answers

    What is the first phase of hacking?

    <p>Reconnaissance</p> Signup and view all the answers

    What is the purpose of the 'nmap' command with the flags '-sX -p 22,53,110,143,4564 198.116.*.1-127'?

    <p>Scan for open ports on specific IP addresses</p> Signup and view all the answers

    Which C/C++ function is notorious for not performing bound checks and is a common source of buffer overflow vulnerabilities?

    <p>gets()</p> Signup and view all the answers

    How can SMB hijacking be prevented in Windows operating systems?

    <p>Disable NetBIOS over TCP/IP in Windows NT and 2000</p> Signup and view all the answers

    Who represents the highest risk to your network among the following types of hackers?

    <p>Black-hat hackers</p> Signup and view all the answers

    Which command-line switch would you use for OS detection in Nmap?

    <p>-O</p> Signup and view all the answers

    How can you compromise a system that relies on cookie-based security?

    <p>Intercept the communication between the client and the server and change the cookie to make the server believe there is a user with higher privileges.</p> Signup and view all the answers

    What action should be taken before using Windows to enhance security?

    <p>Make sure a new installation of Windows is patched by installing the latest service packs.</p> Signup and view all the answers

    What should be done to enhance Windows security immediately upon installation?

    <p>Create a non-admin user with a complex password and log onto this account.</p> Signup and view all the answers

    How could you bypass standard authentication on a VPN?

    <p>Implement biometric authentication instead of standard authentication for VPN access.</p> Signup and view all the answers

    How can an attacker gain higher-level privileges in a system protected by cookies?

    <p>Delete the cookie, reestablish connection to the server, and access higher-level privileges.</p> Signup and view all the answers

    What action would significantly enhance VPN security?

    <p>Enable a 25-character complex password policy for VPN access.</p> Signup and view all the answers

    Who poses the most threat to an organization's security?

    <p>Black-hat hacker</p> Signup and view all the answers

    Which of the following should be included in an ethical hacking report?

    <p>Findings of the test</p> Signup and view all the answers

    What are the four regional Internet registries?

    <p>APNIC, PICNIC, NANIC, ARIN</p> Signup and view all the answers

    Which tool is used for performing footprinting undetected?

    <p>Whois search</p> Signup and view all the answers

    What is the next immediate step after footprinting?

    <p>Scanning</p> Signup and view all the answers

    How does traceroute work?

    <p>It sends a specially crafted IP packet to a router to locate the number of hops from the sender to the destination network.</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser