CMIT 321 Week 1 Quiz
Question 1 points
Which of the following flags will indicate that there is a new sequence number?
PSH
URG
ACK
SYN
Question 0/5
2 points
Which of the following is one of the most reliable forms of TCP scanning?
Connect Scan
XMAS Scan
Inverse TCP Flag Scan
Half-open Scan
Question 2.
3 points
The TCP 3 way handshake terminates after which of the following? (choose all that apply)
RESET
, FIN
SYN
ACK
5/5
Question 4
points
Which Google Advanced Search Operator restricts the results to those websites in a given domain?
[related:]
[domain:]
[info:]
[site:]
Question 5/5
5 points
How many bytes of the TCP/IP Packet are for the data?
16
8
32
56
,Question 5/5
6 points
Using publicly available information and search engines to gather information about a target prior to an
attack is considered reconnaissance.
Active
Passive
Public
Private
Question 5/5
7 points
A ping scan is also a(n) .
ICMP Scan
UDP Scan
Stealth Scan
ACK Flag Probe Scan
Question 5/5
8 points
What is the main purpose of performing an ACK scan?
ACK scanning is stealthy
, To check the filtering of a system
Map the network
Scan for vulnerabilities
Question 0/5
9 points
Traceroute uses the protocol and field of the IP header to record the path of the target on
the network.
ICMP and TTL
TCP and TTL
UDP and ICMP
TCP and ICMP
Question 5/5
10 points
In this phase of an attack the attacker can use the system as a launch pad to scan and exploit other
systems.
Maintaining Access
Scanning
Reconnaissance
Question 1 points
Which of the following flags will indicate that there is a new sequence number?
PSH
URG
ACK
SYN
Question 0/5
2 points
Which of the following is one of the most reliable forms of TCP scanning?
Connect Scan
XMAS Scan
Inverse TCP Flag Scan
Half-open Scan
Question 2.
3 points
The TCP 3 way handshake terminates after which of the following? (choose all that apply)
RESET
, FIN
SYN
ACK
5/5
Question 4
points
Which Google Advanced Search Operator restricts the results to those websites in a given domain?
[related:]
[domain:]
[info:]
[site:]
Question 5/5
5 points
How many bytes of the TCP/IP Packet are for the data?
16
8
32
56
,Question 5/5
6 points
Using publicly available information and search engines to gather information about a target prior to an
attack is considered reconnaissance.
Active
Passive
Public
Private
Question 5/5
7 points
A ping scan is also a(n) .
ICMP Scan
UDP Scan
Stealth Scan
ACK Flag Probe Scan
Question 5/5
8 points
What is the main purpose of performing an ACK scan?
ACK scanning is stealthy
, To check the filtering of a system
Map the network
Scan for vulnerabilities
Question 0/5
9 points
Traceroute uses the protocol and field of the IP header to record the path of the target on
the network.
ICMP and TTL
TCP and TTL
UDP and ICMP
TCP and ICMP
Question 5/5
10 points
In this phase of an attack the attacker can use the system as a launch pad to scan and exploit other
systems.
Maintaining Access
Scanning
Reconnaissance