Home
Flashcards
Preview
FC 2 -50.txt
Home
Get App
Take Quiz
Create
What ICMP code is used in a ping command
ICMP Echo request uses code 8 and Echo Reply uses 0.
True or false: You can run a null scan against Windows systems
False. Running null scans on Windows systems produces incorrect results.
How do you detect the type of OS and application running on a remote server
Telnet to the open port
What port-scanning system uses IPIDs
IDLE scanning
True or false: UDP is a connection-oriented protocol
False
What is the default password used by SNMP
Public
What is the ICMP message type for "destination unreachable"
3
What response will you get for a FIN scan when the port is closed
RST
What response will you get for a FIN scan when the port is open
No response
List the two types of hacking attacks.answer
Active attack and passive attack
What response will you get for an XMAS scan when the port is closed
RST
What response will you get for an XMAS scan when the port is open
No response
Which type of Nmap scan is most reliable
Connect scan
Which organization investigates computer crimes in the United States
National Infrastructure Protection Center (NIPC)
What service listens on port 139
SMB
True or false: SNMPv1
the community string
What part of SID is used for the Administrator account
500
Which tool can you use for zone transfer
Dig
What ports do you block to prevent NetBIOS traffic from entering the network
135
What encryption algorithm does a LAN Manager (LM) use
DES
How do you view old versions of web pages
Visit www.archive.org (the Wayback Machine).
What is a rootkit
A rootkit replaces legitimate system files with corrupted files.
What type of password-cracking programs uses characters
numbers
Which is the well-known Windows password-cracking program
L0phtCrack
What is a wrapper
Wrappers are used to package covert programs with overt programs.
Author
Sanford111
ID
44225
Card Set
FC 2 -50.txt
Description
CEH 2
Updated
2010-10-22T19:27:14Z
Show Answers
Home
Flashcards
Preview