100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

Test Bank For Computer Security and Penetration Testing 2e Alfred Basta Nadine Basta Mary Brown

Beoordeling
-
Verkocht
-
Pagina's
76
Cijfer
A
Geüpload op
30-09-2023
Geschreven in
2022/2023

Chapter 3 True/False Indicate whether the statement is true or false. 1. Scanners were originally developed to aid security professionals and system administrators in examining networks for security vulnerabilities. ANS:T PTS: 1 REF: 45 2. In the early 1980s, the majority of servers ran on Windows platforms. ANS: F PTS: 1 REF: 47 3. A user needs root privileges to perform TCP connect scanning. ANS:F PTS: 1 REF: 48 4. Nessus is a remote security scanner designed to be run on Linux, BSD, Solaris, and other versions of UNIX. ANS: T PTS: 1 REF: 50 5. SARA was designed to complement and interface with other security tools, such as Nmap. ANS: T PTS: 1 REF: 62 Multiple Choice Identify the choice that best completes the statement or answers the question. 1. ____, the precursor to the Internet, appeared in ____. a. UNIX, 1975 c. TCP, 1986 d. UDP, 1993 REF: 46 b. ARPANET, 1969 ANS: B PTS: 1 2. A ____ is a script that tells the modem to dial a range of phone numbers defined by the user, and then identifies those numbers that connect to remote computers. a. modem b. firewall ANS: D PTS: 1 c. router d. war dialer REF: 47 3. In ____, the target host transmits connection-succeeded messages for active ports and host-unreachable messages for inactive ports. a. UDP scanning c. TCP connect scanning b. ping scanning d. IP protocol scanning ANS: C PTS: 1 REF: 48 4. A(n) ____ scan demonstrates whether a remote host is active by sending ICMP echo request packets to that host. c. UDP c. SAINT d. SARA a. IP protocol b. ping ANS: B d. TCP connect REF: 49 PTS: 1 5. ____ is a third-generation network security analysis tool developed by Advanced Research Corporation a. Cheops b. Strobe ANS: D Completion Complete each statement. PTS: 1 REF: 62 1. A(n) ____________________ is a software tool that examines and reports about vulnerabilities on local and remote hosts. ANS: scanner PTS:1REF: 45 2. A(n) ____________________ examines and reports upon the condition (open or closed) of a port as well as the application listening on that port, if possible. ANS: port scanner PTS:1REF: 45 3. ____________________ scanning is TCP connection scanning, but it does not complete the connections. ANS: Half-open PTS:1REF: 48 4. NmapFE is an nmap graphic interface for the ____________________ Linux Desktop. ANS: GNOME PTS:1REF: 59 5. ____________________ was developed by Alexandre Sagala and is a GUI for Nmap, to be used with the KDE desktop environment. ANS: KNmap PTS:1REF: 62 Short Answer 1. How do scanners work? ANS: Scanners automate the process of examining network weaknesses. Scanners are not heuristic; they do not discover new vulnerabilities but check for known vulnerabilities and open ports. A scanner performs these functions: * Connects to a target host(s) * Examines the target host for the services running on it * Examines each service for any known vulnerability Scanners can be set to target either a single IP address,and search for vulnerabilities on the target host, or a range of IP addresses. In either mode, the scanner attempts to connect with the target (or targets) to find open ports and possible vulnerabilities present on the target host(s). PTS:1REF: 47 2. What are the most important types of scanning? ANS: The most important types of scanning are the following: * Transmission Control Protocol (TCP) connect scanning * Half-open scanning * User Datagram Protocol (UDP) scanning * IP protocol scanning * Ping scanning * Stealth scanning PTS: 1 REF: 47-48 3. How does IP protocol scanning work? ANS: IP protocol scanning examines a target host for supported IP protocols. In this method, the scanner transmits IP packets to each protocol on the target host. If a protocol on the target host replies with an ICMP unreachable message to the scanner, then the target host does not use that protocol. If there is no reply, then the hacker assumes that the target host supports that protocol. Unfortunately for the hacker, firewalls and computers that run operating systems such as Digital UNIX (now replaced with Compaq Tru64 Operating System) and HP-UX do not send any ICMP unreachable messages. Consequently, the IP protocols supported by such hosts cannot be determined by using IP protocol scanning. Fortunately for the script kiddie population, the number of Digital UNIX,Tru64, and HP-UX servers is relatively small. PTS:1REF: 49 4. What are some of the most popular scanner tools? ANS: Although the earliest scanners were based on UNIX platforms, they are currently available for Windows and Macintosh platforms. Some popular scanners that can be easily found are: * Nessus * Network Mapper (Nmap) * Security Auditor’s Research Assistant (SARA) * Security Administrator’s Integrated Network Tool (SAINT) * Strobe * Cheops PTS:1REF: 50 5. Briefly describe the main characteristics of Cheops. ANS: Cheops, a port scanner for Linux operating systems, was developed for the GNOME interface by using the GTK+ kit. The most important differentiating feature of Cheops is its graphical nature. This application uses a dramatically large percentage of cpu cycles and slows all other applications to a crawl, which probably has something to do with the complexity of its graphical interface. This is a popular application, but Nessus and Nmap do more useful work without this beautiful GUI. This program can be downloaded from ftp:// PTS: 1 REF: 63

Meer zien Lees minder
Instelling
Computer Security And Penetration
Vak
Computer Security and Penetration











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Computer Security and Penetration
Vak
Computer Security and Penetration

Documentinformatie

Geüpload op
30 september 2023
Aantal pagina's
76
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
ExamsExpert (self)
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
618
Lid sinds
2 jaar
Aantal volgers
313
Documenten
2838
Laatst verkocht
1 dag geleden
ExamsExpert

We as a team provide best and Latest Test Banks that helps students to get A Grade we have vast range of test banks you can order us any test bank that you need

4,5

85 beoordelingen

5
58
4
15
3
9
2
1
1
2

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen