CEH

(Jeff_L) #1

Review Questions 125



  1. What is an ICMP Echo scan?


A. A ping sweep
B. A SYN scan
C. A Xmas scan
D. Part of a UDP scan


  1. Which best describes a vulnerability scan?


A. A way to find open ports
B. A way to diagram a network
C. A proxy attack
D. A way to automate the discovery of vulnerabilities


  1. What is the purpose of a proxy?


A. To assist in scanning
B. To perform a scan
C. To keep a scan hidden
D. To automate the discovery of vulnerabilities


  1. What is Tor used for?


A. To hide web browsing
B. To hide a process of scanning
C. To automate scanning
D. To hide the banner on a system


  1. Why would you need to use a proxy to perform scanning?


A. To enhance anonymity
B. To fool firewalls
C. Perform half-open scans
D. To perform full-open scans


  1. A vulnerability scan is a good way to?


A. Find open ports
B. Find weaknesses
C. Find operating systems
D. Identify hardware
Free download pdf