Exam Questions and CORRECT Answers
To be effective, hackers and cybercriminals: - CORRECT ANSWER✔✔- only need to know
one vulnerability, or how to use one automated tool that attacks that vulnerability.
only need to know one vulnerability, or how to use one automated tool that attacks that
vulnerability. - CORRECT ANSWER✔✔- only need to know one vulnerability, or how to
use one automated tool that attacks that vulnerability.
Which of the following is used to perform a scan of the network and create a network
topology chart? - CORRECT ANSWER✔✔- Zemap
Which of the following is a protocol analyzer tool (sometimes called a "packet sniffer") that
is used to capture IP traffic from a variety of sources? - CORRECT ANSWER✔✔-
Wireshark
Which of the following allows Wireshark to capture packets destined to any host on the same
subnet or virtual LAN (VLAN)? - CORRECT ANSWER✔✔- Promiscuous mode
Which of the following allows analysts to view and analyze network packet traces? -
CORRECT ANSWER✔✔- NetWitness Investigator
Which of the following performs remote scans and audits of Unix, Windows, and network
infrastructures and can perform a network discovery of devices, operating systems,
applications, databases, and services running on those devices? - CORRECT ANSWER✔✔-
Nessus
Which of the following is used to transfer files using the File Transfer Protocol (FTP) to and
from the vWorkstation? - CORRECT ANSWER✔✔- FileZilla
Most Linux interactions take place: - CORRECT ANSWER✔✔- from the command line.
,Within the virtual environment, a Remote Desktop Connection and PuTTY are the two ways
to: - CORRECT ANSWER✔✔- connect to the Linux terminal.
Which of the following does PuTTY use to securely access a remote computer? - CORRECT
ANSWER✔✔- The Secure Shell (SSH) protocol
Once connected, PuTTY displays a terminal shell: - CORRECT ANSWER✔✔- in which
Linux commands can be executed.
Which of the following is a key function in the Cisco IOS (Internetwork Operating System)?
- CORRECT ANSWER✔✔- The show command
The availability of commands in the Cisco IOS (Internetwork Operating System) is based on:
- CORRECT ANSWER✔✔- the privilege level of the user.
Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the ARP Ping
Scan was to: - CORRECT ANSWER✔✔- discover how many hosts are alive.
Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the TCP Port
Scan was to: - CORRECT ANSWER✔✔- identify open TCP ports.
Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the Service
Scan was to: - CORRECT ANSWER✔✔- look for fingerprints of known services by testing
responses to certain types of packets.
Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the
Traceroute was to: - CORRECT ANSWER✔✔- discover the IP path to the remote system.
Zenmap's Topology tab displays a __________ that shows the relative size and connection
type of all discovered IP hosts. - CORRECT ANSWER✔✔- bubble chart
Ethical hackers must obtain __________ prior to performing a scanning and vulnerability
assessment on a live production network. - CORRECT ANSWER✔✔- written authorization
from the client
, During the vulnerability assessment, any known vulnerabilities or bugs will be flagged and
identified by: - CORRECT ANSWER✔✔- Nessus
Which of the following work together to complete the scanning and vulnerability assessment
phase of the ethical hacking process? - CORRECT ANSWER✔✔- Nmap (Zenmap) and
Nessus
A successful __________ assessment of a network is all about using the right tools to map the
network and identify any vulnerabilities that can be the opening for a future attack. -
CORRECT ANSWER✔✔- scanning and vulnerability
Which of the following is a graphical interface for Nmap that is typically used during the
scanning phase of the ethical hacking process? - CORRECT ANSWER✔✔- Zenmap
Which of the following is a port scanning tool that can quickly identify hosts and detect what
operating system and services are running on them? - CORRECT ANSWER✔✔- Zenmap
The __________ confirms that the machine is available, but can't identify ports, operating
systems, or services. - CORRECT ANSWER✔✔- Ping scan
The raw data from the Nmap Output tab is grouped into a more readable form: - CORRECT
ANSWER✔✔- on the Ports/Hosts and Host Details tab for each host in the scan.
The __________ is a form of TCP scanning that is less intrusive on the target host. -
CORRECT ANSWER✔✔- SYN scan
The __________ can identify the services using the TCP protocol, but not the versions of
these applications. - CORRECT ANSWER✔✔- SYN scan
Within Zenmap, which command is used to begin the OS fingerprinting scan and determine
which operating systems are running on the network hosts? - CORRECT ANSWER✔✔- The
-O command