ISC Exam Questions

Which of the following tools will he use to accomplish his task?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully performed the following steps of the pre-attack phase to check the security of the We-are-secure network: Gathering information
Determining the network range Identifying active systems Now, he wants to find the open ports
and applications running on the network. Which of the following tools will he use to accomplish his
task?

A.
ARIN
and B are incorrect. RIPE, ARIN, and APNIC are the Regional Internet Registries (RIR) that
manage, distribute, and register public IP addresses within their respective regions. These can be
used as passive tools by an attacker to determine the network range.
QUESTION 250
authentication method uses smart cards as well as usernames and passwords for
authentication. Which of the following authentication methods is being referred to?
Anonymous
administrator must create a user account in IIS to enable the user to connect anonymously.

B.
APNIC
Mutual

C.
RIPE
Multi-factor

D.
SuperScan
Biometrics

A.
ARIN
and B are incorrect. RIPE, ARIN, and APNIC are the Regional Internet Registries (RIR) that
manage, distribute, and register public IP addresses within their respective regions. These can be
used as passive tools by an attacker to determine the network range.
QUESTION 250
authentication method uses smart cards as well as usernames and passwords for
authentication. Which of the following authentication methods is being referred to?
Anonymous
administrator must create a user account in IIS to enable the user to connect anonymously.

A.
ARIN
and B are incorrect. RIPE, ARIN, and APNIC are the Regional Internet Registries (RIR) that
manage, distribute, and register public IP addresses within their respective regions. These can be
used as passive tools by an attacker to determine the network range.
QUESTION 250
authentication method uses smart cards as well as usernames and passwords for
authentication. Which of the following authentication methods is being referred to?
Anonymous
administrator must create a user account in IIS to enable the user to connect anonymously.

A.
ARIN
and B are incorrect. RIPE, ARIN, and APNIC are the Regional Internet Registries (RIR) that
manage, distribute, and register public IP addresses within their respective regions. These can be
used as passive tools by an attacker to determine the network range.
QUESTION 250
authentication method uses smart cards as well as usernames and passwords for
authentication. Which of the following authentication methods is being referred to?
Anonymous
administrator must create a user account in IIS to enable the user to connect anonymously.

B.
APNIC
Mutual

C.
RIPE
Multi-factor

D.
SuperScan
Biometrics

A.
ARIN
and B are incorrect. RIPE, ARIN, and APNIC are the Regional Internet Registries (RIR) that
manage, distribute, and register public IP addresses within their respective regions. These can be
used as passive tools by an attacker to determine the network range.
QUESTION 250
authentication method uses smart cards as well as usernames and passwords for
authentication. Which of the following authentication methods is being referred to?
Anonymous
administrator must create a user account in IIS to enable the user to connect anonymously.

Explanation:
In such a situation, John will use the SuperScan tool to find the open ports and applications on the
We-are-secure network. SuperScan is a TCP/UDP port scanner. It also works as a ping sweeper
and hostname resolver. It can ping a given range of IP addresses and resolve the host name of
the remote system. The features of SuperScan are as follows: It scans any port range from a built-in list or any given range. It performs ping scans and port scans using any IP range. It modifies the
port list and port descriptions using the built in editor. It connects to any discovered open port

Multi-factor authentication involves a combination of multiple methods of
authentication. For example, an authentication method that uses smart cards as well as
incorrect. Mutual authentication is a process in which a client process and server are required to
prove their identities to each other before performing any application function. The client and
server identities can be verified through a trusted third party and use shared secrets as in the case
of Kerberos v5. The MS-CHAP v2 and EAP-TLS authentication methods support mutual
used for Internet communication. It provides limited access to specific public folders and directory
information. It is supported by all clients and is used to access unsecured content in public folders.
fingerprints, scars, retinal patterns, and other forms of biophysical qualities to identify a user.