What port scanning method involves sending spoofed packets to a target system and then looking for adjustments
What port scanning method involves sending spoofed packets to a target system and then looking for adjustments to the IPID on a zombie system?
An Nmap scan shows the following open ports, and nmap also reports that the OS guessing results to match too m
An Nmap scan shows the following open ports, and nmap also reports that the OS guessing results to match too many signatures hence it cannot reliably beidentified: 21 ftp 23 telnet 80 http 443https What does this suggest ?
Why would a modem security tester consider using such an old technique?
War dialing is a very old attack and depicted in movies that were made years ago. Why would a modem security tester consider using such an old technique?
What is the most likely cause behind this response?
While performing a ping sweep of a subnet you receive an ICMP reply of Code 3/Type 13 for all the pings sent out. What is the most likely cause behind this response?
Which of these would be a cause for alarm?
Network Administrator Patricia is doing an audit of the network. Below are some of her findings concerning DNS. Which of these would be a cause for alarm? Select the best answer.
Which one would you suggest she looks in first?
Your lab partner is trying to find out more information about a competitors web site. The site has a .com extension. She has decided to use some online whois tools and look in one of the regional Internet registrys. Which one would you suggest she looks in first?
While footprinting a network, what port/service should you look for to attempt a zone transfer?
While footprinting a network, what port/service should you look for to attempt a zone transfer?
What does the following command accomplish?
NSLookup is a good tool to use to gain additional information about a target network. What does the following command accomplish? nslookup > server > set type =any > ls -d
According to the CEH methodology, what is the next step to be performed after footprinting?
According to the CEH methodology, what is the next step to be performed after footprinting?