Review Questions 125
- What is an ICMP Echo scan?
A. A ping sweep
B. A SYN scan
C. A Xmas scan
D. Part of a UDP scan
- Which best describes a vulnerability scan?
A. A way to find open ports
B. A way to diagram a network
C. A proxy attack
D. A way to automate the discovery of vulnerabilities
- What is the purpose of a proxy?
A. To assist in scanning
B. To perform a scan
C. To keep a scan hidden
D. To automate the discovery of vulnerabilities
- What is Tor used for?
A. To hide web browsing
B. To hide a process of scanning
C. To automate scanning
D. To hide the banner on a system
- Why would you need to use a proxy to perform scanning?
A. To enhance anonymity
B. To fool firewalls
C. Perform half-open scans
D. To perform full-open scans
- A vulnerability scan is a good way to?
A. Find open ports
B. Find weaknesses
C. Find operating systems
D. Identify hardware