Topic 3, Scanning
What does an ICMP (Code 13) message normally indicates?
A.
It indicates that the destination host is unreachable
B.
It indicates to the host that the datagram which triggered the source quench message
will need to be re-sent
C.
It indicates that the packet has been administratively dropped in transit
D.
It is a request to the host to cut back the rate at which it is sending traffic to the Internet
destination
It indicates that the packet has been administratively dropped in transit
Explanation: CODE 13 and type 3 is destination unreachable due to communication
administratively prohibited by filtering hence maybe they meant "code 13", therefore would
be C).
Note:A - Type 3B - Type 4C - Type 3 Code 13D - Typ4 4
Steve scans the network for SNMP enabled devices. Which port number Steve
should scan?
A.
69
B.
150
C.
161
D.
169
161
Explanation: The SNMP default port is 161. Port 69 is used for tftp, 150 is for SQL-NET
and 169 is for SEND.
You are having problems while retrieving results after performing port scanning
during internal testing. You verify that there are no security devices between you
and the target system. When both stealth and connect scanning do not work, you
decide to perform a NULL scan with NMAP. The first few systems scanned shows all
ports open.
Which one of the following statements is probably true?
A.
The systems have all ports open.
B.
The systems are running a host based IDS.
C.
The systems are web servers.
D.
The systems are running Windows.
The systems are running Windows.
Explanation: The null scan turns off all flags, creating a lack of TCP flags that should
never occur in the real world. If the port is closed, a RST frame should be returned and a
null scan to an open port results in no response. Unfortunately Microsoft (like usual)
decided to completely ignore the standard and do things their own way. Thus this scan type
will not work against systems running Windows as they choose not to response at all. This
is a good way to distinguish that the system being scanned is running Microsoft Windows.
You are scanning into the target network for the first time. You find very few
conventional ports open. When you attempt to perform traditional service
identification by connecting to the open ports, it yields either unreliable or no
results. You are unsure of which protocols are being used. You need to discover as
many different protocols as possible.
Which kind of scan would you use to achieve this? (Choose the best answer)
A.
Nessus scan with TCP based pings.
B.
Nmap scan with the –sP (Ping scan) switch.
C.
Netcat scan with the –u –e switches.
D.
Nmap with the –sO (Raw IP packets) switch.
Nmap with the –sO (Raw IP packets) switch.
Explanation: Running Nmap with the –sO switch will do a IP Protocol Scan. The IP
protocol scan is a bit different than the other nmap scans. The IP protocol scan is
searching for additional IP protocols in use by the remote station, such as ICMP, TCP, and
UDP. If a router is scanned, additional IP protocols such as EGP or IGP may be identified.
What is the proper response for a X-MAS scan if the port is closed?
A.
SYN
B.
ACK
C.
FIN
D.
PSH
E.
RST
F.
No response
RST
Explanation: Closed ports respond to a X-MAS scan with a RST.
Page 16 out of 153 Pages |
Previous |