Home
You may like this!
21.
Which of the following is used for banner grabbing?
  • A.
    Telnet
  • B.
    FTP
  • C.
    SSH
  • D.
    Wireshark
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Telnet is used to perform banner grabs against a system. However, other tools are available to do this as well.
Report
Name Email  
22.
Which of the following is used for identifying a web server OS?
  • A.
    Telnet
  • B.
    Netcraft
  • C.
    Fragroute
  • D.
    Wireshark
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Netcraft is used to gather information about many aspects of a system, including operating system, IP address, and even country of origin.
Report
Name Email  
23.
Which of the following is used to perform customized network scans?
  • A.
    Nessus
  • B.
    Wireshark
  • C.
    AirPcap/li>
  • D.
    nmap
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Nmap is a utility used to scan networks and systems and for other types of custom scans.
Report
Name Email  
24.
Which of the following is not a flag on a packet?
  • A.
    URG
  • B.
    PSH
  • C.
    RST
  • D.
    END
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
END is not a type of flag. Valid flags are ACK, FIN, SYN, URG, RST, and PSH.
Report
Name Email  
25.
An SYN attack uses which protocol?
  • A.
    TCP
  • B.
    UDP
  • C.
    HTTP
  • D.
    Telnet
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
SYN flags are seen only on TCP-based transmissions and not in UDP transmissions of any kind.
Report
Name Email