Topic 3, Scanning
________ is an automated vulnerability assessment tool.
A.
Whack a Mole
B.
Nmap
C.
Nessus
D.
Kismet
E.
Jill32
Nessus
Explanation: Nessus is a vulnerability assessment tool.
Which of the following is an automated vulnerability assessment tool.
A.
Whack a Mole
B.
Nmap
C.
Nessus
D.
Kismet
E.
Jill32
Nessus
Explanation: Nessus is a vulnerability assessment tool.
What are the four steps is used by nmap scanning?
A.
DNS Lookup
B.
ICMP Message
C.
Ping
D.
Reverse DNS lookup
E.
TCP three way handshake
F.
The Actual nmap scan
DNS Lookup
Ping
Reverse DNS lookup
The Actual nmap scan
Explanation: Nmap performs four steps during a normal device scan. Some of these steps
can be modified or disabled using options on the nmap command line.
If a hostname is used as a remote device specification, nmap will perform a DNS
lookup prior to the scan.
Nmap pings the remote device. This refers to the nmap "ping" process, not
(necessarily) a traditional ICMP echo request.
If an IP address is specified as the remote device, nmap will perform a reverse
DNS lookup in an effort to identify a name that might be associated with the IP
address. This is the opposite process of what happens in step 1, where an IP
address is found from a hostname specification.
Nmap executes the scan. Once the scan is over, this four-step process is
completed. Except for the actual scan process in step four, each of these steps
can be disabled or prevented using different IP addressing or nmap options. The
nmap process can be as "quiet" or as "loud" as necessary!
While performing a ping sweep of a subnet you receive an ICMP reply of Code
3/Type 13 for all the pings sent out.
What is the most likely cause behind this response?
A.
The firewall is dropping the packets.
B.
An in-line IDS is dropping the packets.
C.
A router is blocking ICMP.
D.
The host does not respond to ICMP packets.
A router is blocking ICMP.
Explanation: Type 3 message = Destination Unreachable [RFC792], Code 13 (cause) =
Communication Administratively Prohibited [RFC1812]
Which of the following nmap command in Linux procedures the above output?
A.
sudo nmap –sP 192.168.0.1/24
B.
root nmap –sA 192.168.0.1/24
C.
run nmap –TX 192.168.0.1/24
D.
launch nmap –PP 192.168.0.1/24
sudo nmap –sP 192.168.0.1/24
Explanation: This is an output from a ping scan. The option –sP will give you a ping scan
of the 192.168.0.1/24 network.
Page 14 out of 153 Pages |
Previous |