Chapter 6 ■ Security Assessment and Testing (Domain 6) 141
- Match each of the numbered scanning types with the appropriate lettered description
shown. You should use each item exactly once.
Scanning types
- TCP Connect
- TCP ACK
- TCP SYN
- Xmas
Scanning descriptions
A. Sends a request to open a new connection
B. Completes a three-way handshake
C. Sends a packet disguised as part of an active control
D. Sends a packet with the FIN, PSH, and URG flags set
Kara used nmap to perform a scan of a system under her control and received the results
shown here. Refer to these results to answer questions 56 and 57.
- If Kara’s primary concern is preventing eavesdropping attacks, which port should she block?
A. 22
B. 80
C. 443
D. 1433
- If Kara’s primary concern is preventing administrative connections to the server, which
port should she block?
A. 22
B. 80
C. 443
D. 1433 - During a third-party audit, Jim’s company receives a finding that states, “The administra-
tor should review backup success and failure logs on a daily basis, and take action in a
timely manner to resolve reported exceptions.” What is the biggest issue that is likely to
result if Jim’s IT staff need to restore from a backup?
A. They will not know if the backups succeeded or failed.
B. The backups may not be properly logged.
C. The backups may not be usable.
D. The backup logs may not be properly reviewed.