21.
Which of the following is used for banner grabbing?
- A.Telnet
- B.FTP
- C.SSH
- D.Wireshark
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Telnet is used to perform banner grabs against a system. However, other tools are available to do this as well. |
22.
Which of the following is used for identifying a web server OS?
- A.Telnet
- B.Netcraft
- C.Fragroute
- D.Wireshark
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Netcraft is used to gather information about many aspects of a system, including operating system, IP address, and even country of origin. |
23.
Which of the following is used to perform customized network scans?
- A.Nessus
- B.Wireshark
- C.AirPcap/li>
- D.nmap
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Nmap is a utility used to scan networks and systems and for other types of custom scans. |
24.
Which of the following is not a flag on a packet?
- A.URG
- B.PSH
- C.RST
- D.END
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
END is not a type of flag. Valid flags are ACK, FIN, SYN, URG, RST, and PSH. |
25.
An SYN attack uses which protocol?
- A.TCP
- B.UDP
- C.HTTP
- D.Telnet
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
SYN flags are seen only on TCP-based transmissions and not in UDP transmissions of any kind. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40