unit 6 eti
unit 6 eti
1) ___ used for windows for network queries from DNS lookups to trace routes.
a. Sam Spade
b. Super Scan
c. NetScan
d. Nmap
3) ___ tools Pro for dozens of network security-assessment functions, including ping sweeps, port
scanning, and SMTP relay testing.
a. Sam Spade
b. Super Scan
c. NetScan
d. Nmap
4) ____ used as a happy-clicky-GUI front end for host-port probing and operating system fingerprinting.
a. Sam Spade
b. Super Scan
c. NetScan
d. Nmap or NMapWin
5) ____ is the most versatile security tool for such security checks as port scanning and firewall testing. a.
NetScan
b. Nmap or NMapWin
c. Netcat
d. WildPacketsEtherPeek
7) Which software tool is used to scan the network to see who’s there and provide basic views of how the
network is laid out?
a. Port Scanner
b. Ping Sweeping
c. SNMP Scanning
d. Banner Grabbing
8) As an ethical hacker, you should scan all ____ ports on each network host that’s found by your scanner.
a. 6346 TCP and 6347 UDP
b. 27665 TCP and 31335 UDP
c. 65,535 TCP and 65,535 UDP
d. 1434 TCP and 1434 UDP
19) Which tool is used to find out the general network information, such as the number of unique IP
addresses, NetBIOS names and MAC addresses?
a. Nmap
b. Sam Spade
c. NetScanTools Pro
d. None of the above
20) ____ is executed through the searching of multiple hosts in order to target just one specific open port. a.
Port scanning
b. Port sweeping
c. Port searching
d. None of the above
21) _____ is considered a serious threat to one’s PC, as it can occur without producing any outward signs to
the owner that anything dangerous is taking place.
a. Port scanning
b. Port sweeping
c. Port searching
d. None of the above
22) A ___ monitors incoming and outgoing connections through one’s personal computer. a. Router
b. Repeater
c. Firewall
d. Modem
27) If ___ is compromised, a hacker can gather such network information as ARP tables and TCP
connections to attack your systems.
a. ICMP
b. SNMP
c. FTP
d. Banner grabbing
28) ____ is the act of capturing the information provided by banners, configurable text-based welcome
screens from network hosts that generally display system information.
a. ICMP
b. SNMP
c. FTP
c.
d.
d. Banner grabbing
31)____ can grab banner information from routers and other network hosts, such as a wireless access point
or managed Ethernet switch.
a. Telnet
b. Netcat
c. Network analyzer
d. None of the above
32) A ___ is a tool that allows you to look into a network and analyze data going across the wire for
network optimization, security, and/or troubleshooting purposes.
a. Telnet
b. Netcat
c. Network analyzer
d. None of the above
34) EtherPeek by WildPackets network analyzer tools supports ____ operating system. a. Windows
b. Windows and UNIX
c. Windows and Linux
d. UNIX
35) Ethereal & Ettercap Network analyzer tool supports _____ operating system.
a. Windows
b. Windows and UNIX
c. Windows and Linux
d. UNIX
37) ____ tools can modify the ARP tables, which are responsible for saving IP addresses to MAC address
mappings on network hosts.
a. Dsniff tool
b. Cain & Abel tool
c.
d.
Both a & b
None of the above
38)The victims machines think they require to forward traffic to the hacker’s computer rather than to the
correct destination machine when communicating on the network and this type of is called as _____
a. Denial of service attack
b. Man-in-the-middle attack
c. ARP spoofing attack
d. None of the above
39) An excessive amount of ARP requests can be a sign of an ____ attack on your network. a. ARP
poisoning attack
b. ARP spoofing attach
c. Man-in-the-middle attack
d. Both a & b
41) ____ can be captured directly out of the airwaves, making this communication medium susceptible to
malicious eavesdropping.
a. Wired traffic
b. Wireless traffic
c. Rogue networks
d. Physical security problems
43) The Orinoco Client Manager software stores ____ keys in the windows Registry even for multiple
networks.
a. Decrypted WEP
b. Encrypted WEP
c. Both a & b
d. None of the above
45)An _____ is a program that acts as an interface between the software and computer hardware. a.
Networking
b. Remote code execution
c. Storage overload
d. Operating System
47) An attacker can create an ______attack by sending hundreds or thousands of e-mails with very large
attachments.
a. Connection attack
b. Autoresponder attack
c. Attachment overloading attack
d. All of the above
48) Multiple large messages can quickly fill the total storage capacity of an e-mail server is called as __
a. Email bomb
b. Storage overload
c. Bandwidth blocking
d. Connection attack
49) What are the countermeasures are there to prevent attachment-overloading attack?
a. Limit the size of either e-mails or e-mail attachments
b. Limit each user’s space on the server
c. Both a & b
d. None of the above
d. Connection attack
51) ____ is that annoying automatic e-mail response you often get back from random users when you’re
subscribing to a mailing list.
a. Connection attack
b. Autoresponder attack
c. Attachment overloading attack
d. All of the above
52) ___ attack is basically browsing a site and looking for clues about the server’s directory structure. a.
SQL Injection
b. Cross site Scripting
c. Directory Traversals
d. Security Misconfiguration