- (Topic 6)
What port scanning method is the most reliable but also the most detectable?
Correct Answer:
B
A TCP Connect scan, named after the Unix connect() system call is the most accurate scanning method. If a port is open the operating system completes the TCP three- way handshake, and the port scanner immediately closes the connection.
- (Topic 7)
A POP3 client contacts the POP3 server:
Correct Answer:
B
POP is used to receive e-mail. SMTP is used to send e-mail.
- (Topic 6)
You are manually conducting Idle Scanning using Hping2. During your scanning you notice that almost every query increments the IPID regardless of the port being queried. One or two of the queries cause the IPID to increment by more than one value. Why do you think this occurs?
Correct Answer:
A
If the IPID is incremented by more than the normal increment for this type of system it means that the system is interacting with some other system beside yours and has sent packets to an unknown host between the packets destined for you.
- (Topic 5)
A hacker is attempting to see which ports have been left open on a network. Which NMAP switch would the hacker use?
Correct Answer:
A
- (Topic 8)
Exhibit:
<>
Correct Answer:
D
The attacker submits a PASS to the honeypot and receives a login incorrect before disconnecting.