978-0840020932 Chapter 3

subject Type Homework Help
subject Pages 5
subject Words 831
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 3
True/False
Indicate whether the statement is true or false.
1. Scanners were originally developed to aid security professionals and system administrators in examining networks for
security vulnerabilities.
2. In the early 1980s, the majority of servers ran on Windows platforms.
3. A user needs root privileges to perform TCP connect scanning.
4. Nessus is a remote security scanner designed to be run on Linux, BSD, Solaris, and other versions of UNIX.
5. SARA was designed to complement and interface with other security tools, such as Nmap.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
1. ____, the precursor to the Internet, appeared in ____.
a.
UNIX, 1975
c.
TCP, 1986
b.
ARPANET, 1969
d.
UDP, 1993
2. A ____ is a script that tells the modem to dial a range of phone numbers defined by the user, and then identifies those
numbers that connect to remote computers.
a.
modem
c.
router
b.
firewall
d.
war dialer
3. In ____, the target host transmits connection-succeeded messages for active ports and host-unreachable messages for
inactive ports.
a.
UDP scanning
c.
TCP connect scanning
b.
ping scanning
d.
IP protocol scanning
page-pf2
4. A(n) ____ scan demonstrates whether a remote host is active by sending ICMP echo request packets to that host.
a.
IP protocol
c.
UDP
b.
ping
d.
TCP connect
5. ____ is a third-generation network security analysis tool developed by Advanced Research Corporation
a.
Cheops
c.
SAINT
b.
Strobe
d.
SARA
Completion
Complete each statement.
1. A(n) ____________________ is a software tool that examines and reports about vulnerabilities on local and remote
hosts.
2. A(n) ____________________ examines and reports upon the condition (open or closed) of a port as well as the
application listening on that port, if possible.
3. ____________________ scanning is TCP connection scanning, but it does not complete the connections.
4. NmapFE is an nmap graphic interface for the ____________________ Linux Desktop.
5. ____________________ was developed by Alexandre Sagala and is a GUI for Nmap, to be used with the KDE
desktop environment.
page-pf3
Short Answer
1. How do scanners work?
2. What are the most important types of scanning?
3. How does IP protocol scanning work?
4. What are some of the most popular scanner tools?
page-pf4
5. Briefly describe the main characteristics of Cheops.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.