J01: Port Scanners (PE) Flashcards

1
Q

NMAP-13

This Parameter will control the timing of scanning and is the highest speed available. This speed can expose your overall intent.

A

-T5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NMAP-100

This Parameter will commence a XMAS scan on a device

A

-xS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NMAP-144

This Parameter will export the scan results as an XML for external manipulation.

A

-oX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NMAP-185

Nmap’s default scan with admin privledges

  • -Pn
  • -sT
  • -sS
  • sU
A

-sS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NMAP-187

Nmaps default scan with without admin privledges

  • -Pn
  • -sT
  • -sS
  • sU
A

sT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NMAP-201

This Parameter will give more information on basic scans implemented

A

-v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NMAP-309

____ - This port state is the result of an active port with an application that is actively accepting TCP connections.

A

open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NMAP-367

This Parameter will scan only the provided ports input

A

-p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NMAP-404

____ Is the result when it cannot determine whether the port is active because packet sorting stops connections from reaching the port. It could be the result of a dedicated firewall device, router, router rules or host-based firewall software.

A

filtered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NMAP-469

Make an nmap scan for nonexist.org and Include more information

A

nmap -v nonexist.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NMAP-488

What flags are sent in a christmas scan?

  • SYN,SYN/ACK,PSH,ACK
  • FIN,PSH,URG
  • FIN,PSH,URG,SYN,SYN/ACK
  • FIN,SYN,SYN/ACK,PSH
A

FIN, PSH, URG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NMAP-501

This parameter with specified numbers will scan all ports

A

-p 0-65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NMAP-543

Conduct a service probe on “scanme.nmap.org” for top ports on the machine. What ports are open? EX:10,20,30,455 (Lowest to highest port)

A

22,80,646,9929,61337

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NMAP-552

This parameter/option will assume every host in a network scan is online. Example: -sS

A

-Pn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NMAP-559

This Parameter will enable you to import a list of ip addresses or networks to scan

A

-iL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NMAP-580

Nmap scans how many ports by default if not specified?

  • 500 ports
  • 1000 ports
  • Top 1000 used ports
  • All well known ports
A

Top 1000 used ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NMAP-651

what is the possible Operating system for scanme.nmap.org?

  • Linux
  • Solaris
  • Debian
  • Windows
A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NMAP-719

When implementing nmap on a network its capabilities can include identifying ports, servers and active hosts within the network scope. What type of reconnaissance is nmap classified to implement on a network?

  • Recursive
  • Active
  • Passive
  • Port-scanner
A

Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NMAP-780

This parameter will enable OS detection

A

-O

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NMAP-786

____ The result of a port that is active but has no application listening on it.

A

closed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NMAP-839

Nmap has the capability to integrate scripts

  • TRUE
  • FALSE
A

TRUE

22
Q

NMAP-848

____ Is the result when nmap can connect to a port but is unable to verify ports as active or deactivated

A

unfiltered

23
Q

NMAP-915

Create a nmap scan that will scan a 198.216.0.0/16 network for version information on services ssh,dns,pop3 and RDP

A

nmap -sV -p 22,53,110,3389 198.216.0.0/16

24
Q

NMAP-930

This Parameter will control the timing of scanning and takes the longest time to assist in avoiding detection.

A

-T0

25
Q

NMAP-973

Nmap scans are a form of what type of reconnisance?

A

Active

26
Q

Port Scanning 01:

What tool utilizes the command “ping scan”.

A

nmap

27
Q

Port Scanning 02:

What tool would utilize the command: nc -z -v site.com?

A

ncat

28
Q

Port Scanning 03:

Port Scanning does what?

  • checks IP addresses
  • determines number of hops between routes
  • determines fastest route to delivery packets
  • to check which ports are open
A

to check which ports are open

29
Q

Port Scanning 04:

What tool is used to read and write data across network connections using TCP or UDP protocol?

A

netcat

30
Q

Port Scanning 05:

Which of the following tasks can NOT be done using Nmap?

  • Quickly recognize devices on a single or multiple networks
  • Monitor large networks
  • Transfer files across the network
  • Detects security risks
A

Transfer files across the network

31
Q

Port Scanning 06:

True or False: Nmap utilizes a graphical user interface known as Zmap that develops visual nc -l – This command will instruct mappings of a network for better usability and reporting.

A

False

32
Q

Port Scanning 06:

True or False: Nmap utilizes a graphical user interface known as Zmap that develops visual nc -l – This command will instruct mappings of a network for better usability and reporting.

A

False

33
Q

Port Scanning 07:

Which term correctly fills in the blank? ScanLine is a command-line port scanner for all ______ platforms.

  • ChromeOS
  • MacOS
  • Windows
  • Linux
A

windows

34
Q

Port Scanning 08:

Which tool is used for vulnerability scanning and network discovery?

  • Netcat
  • Cisco Packet Tracer
  • ZenMap
  • Nmap
A

Nmap

35
Q

Port Scanning 09:

True or False: Netcat functions as a front-end tool that allows for port scanning and port listening.

A

False

36
Q

Port Scanning 10:

CryptCat uses what encryption method?

  • AES
  • TwoFish
  • DES
  • ThreeFish
A

TwoFish

37
Q

Port Scanning 11:

True or False: In order to conduct port scanning you first need a list of what hosts are on the network along with the IP addresses.

A

True

38
Q

Port Scanning 12:

Which of the following are advantages to port scanning? Select all that apply:

  • Finding open and vulnerable server locations
  • Checking security settings
  • Identifying hosts connected to the network and the services that are running on them
  • All of the above
A

All of the above

39
Q

Port Scanning 13:

This type of scanning is performed by sending an SYN packet and analyzing the response. What type of scan is this?

A

syn scan

40
Q

Port Scanning 14:

TwoFish encryption utilizes _____ and one ____ key.

  • Symmetric encryption and uses one 128-bit key
  • Symmetric encryption and uses one 256-bit key
  • Asymmetric encryption and uses one 2048-bit key
  • None of the above
A

Symmetric encryption and uses one 256-bit key

41
Q

Port Scanning 15:

Which of these is the simplest port scan?

  • TCP Half Open Port Scan
  • UDP
  • Ping Scan
  • None of the above
A

Ping Scan

42
Q

Port Scanning 16:

True or False: While port scanning is an incredibly useful tool for malicious actors to use during reconnaissance, it is not nearly as useful for IT admin staff.

A

False

43
Q

Port Scanning 17:

Which of these is the simplest port scan?

  • TCP Half Open Port Scan
  • UDP
  • Ping Scan
  • None of the above
A

Ping Scan

44
Q

Port Scanning 18:

Which of these functions can be performed using ScanLine?

  • ICMP TimeStamp Scanning
  • TCP Scanning
  • UDP Scanning
  • All of the above
A

All of the above

45
Q

Port Scanning 19:

This command will do what function? nc -l

  • This command will print a list of all of the available commands you can use in Netcat.
  • This will run a basic port scan of the specified website or server.
  • This command will instruct the local system to begin listening for TCP connections and UDP activity on a specific port number.
  • None of the above
A

This command will instruct the local system to begin listening for TCP connections and UDP activity on a specific port number.

46
Q

Port Scanning 20:

True or False: A number of TCP protocol techniques actually make it possible for attackers to conceal their network location and use “decoy traffic” to perform port scans without revealing any network address to the target.

A

True

47
Q

Port Scanning 21:

Fill in the blank: Ports 0 to _____ are well known port numbers that are designed for Internet use although they can have specialized purposes as well.

  • 1023
  • 65,536
  • 1064
  • 783
A

1023

48
Q

Port Scanning 22:

Fill in the blank: Ports range from 0 to ______and basically rank by popularity.

  • 1023
  • 65,536
  • 1064
  • 783
A

65,536

49
Q

Port Scanning 23:

The range of ports mentioned in question 22 are administered by what organization?

  • National Security Agency
  • Defense Information Systems Agency
  • Cybersecurity and Infrastructure Security Agency
  • Internet Assigned Numbers Authority
A

Internet Assigned Numbers Authority

50
Q

Port Scanning 24:

Fill in the Blank: What are the general protocols used for port scanning?

  • TCP, ICMP
  • UDP, FTTP
  • TCP, SMTP
  • None of the Above
A

None of the Above