Which type of hacker is considered unethical?
3. Black Hat
What is the main difference between ethical and malicious hackers?
1. Ethical hackers have written permission
Which type of testing takes place when pentesters have no knowledge of the target network?
2. Black Box
Suppose an attacker alters the contents of two files on the server. Which of the following best describes what was compromised?
3. Integrity
Which of the following is _not_ a part of information gathering?
A SYN Scan is used in which kind of reconnaissance?
1. Active Reconnaissance
An ICMP Type 8 message indicates which of the following?
1. Ping Request
Suppose you run a SYN scan against a target host. Which of the following best describes the state of connections to the target machine after the scan?
1. Half-Open
Which of the following is a Layer 2 attack?
1. ARP Spoofing
Which of the following Nmap flags is used for OS fingerprinting?
Identify what the following Nmap command does: nmap -sn 192.168.12.0/24
Suppose you run the following command. If port 22 is open, which TCP flag is set on the response?
bash $ nmap -sS -p 22 192.168.12.7
Which argument will be used for OS detection in Nmap?
What will the following nmap command accomplish?
NMAP -sS -O -p 123,153 192.168.100.4
2. A stealth scan, determine the operating system, and scanning of ports 123 and 153
Regarding port enumeration, which port does DNS zone transfer use?
You are sent to scan a remote host using nmap. Which of the following scan types is the BEST choice to gather the most information while minimizing the chance of detection?
You are asked to access a server at a particular IP address. The server does not respond to ping requests, what could be the reason(s)? Select all the apply.
Which command would you issue to scan all TCP ports on 192.168.1.1?
Which of the following nmap arguments are used to perform a Null scan:
Most scan attempts can be detected and flagged by:
Which of these scan types in nmap would make a full TCP connection to the target system?
What does the Nmap -sU flag do?
Which of the following is also known as a Zombie scan?
Which of the following commands scans both TCP and UDP port 445?