Search Header Logo

CEH - Chap 5

Authored by Valérian CASTEL

Computers

Professional Development

Used 2+ times

CEH - Chap 5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

1. If you receive a RST packet back from a target host, what do you know about your target?

A. The target is using UDP rather than TCP.
B. The destination port is open on the target host.
C. The source port in the RST message is closed.
D. The target expects the PSH flag to be set.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

2. What is the difference between a SYN scan and a full connect scan?

A. A SYN scan and a full connect scan are the same.
B. A full connect scan sends an ACK message first.
C. A SYN scan uses the PSH flag with the SYN flag.
D. The SYN scan doesn’t complete the three-way handshake.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

3. What is one reason a UDP scan may take longer than a TCP scan of the same host?

A. UDP will retransmit more.
B. UDP has more ports to scan.
C. UDP is a slower protocol.
D. UDP requires more messages to set up.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

4. Why does an ACK scan not indicate clearly that ports are open?

A. The scanner has to guess.
B. ACK is not a supported flag.
C. The target system ignores the message.
D. ACK scans cause a lot of retransmits.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

5. What is one reason for using a scan like an ACK scan?

A. It may get through firewalls and IDS devices.
B. It is better supported.
C. The code in nmap is more robust.
D. An ACK scan is needed for scripting support.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

6. What does nmap look at for fingerprinting an operating system?

A. The operating system headers
B. The application version
C. The response from connecting to port 0
D. The IP ID field and the initial sequence number

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

7. What is nmap looking at when it conducts a version scan?

A. TCP and IP headers
B. Application banners
C. Operating system kernel
D. IP ID and TCP sequence number fields

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?