All these Questions are in this Section were asked in Certified Ethical Hacker Examinations of EC-Council .This is the 8th part


1- You are using NMAP to resolve domain names into IP addresses for a ping sweep later.Which of the following commands looks for IP addresses?

A. >host -t a hackeddomain.com
B. >host -t soa hackeddomain.com
C. >host -t ns hackeddomain.com
D. >host -t AXFR hackeddomain.com

Answer: A. >host -t a hackeddomain.com

2- Which of the following is an NMAP script that could help detect HTTP Methods such as GET, POST, HEAD, PUT, DELETE, TRACE?
A. http-git
B. http-headers
C. http enum
D. http-methods

Answer: D. http-methods



Related Link=> Previous post of Ethical Hacker Examination Que & Ans
Part-7
Part-6 , Part-5 , Part-4 , Part-3 , Part-2 , Part-1

3- You’re doing an internal security audit and you want to find out what ports are open on all the servers. What is the best way to find out?
A. Scan servers with Nmap
B. Physically go to each server
C. Scan servers with MBSA
D. Telent to every port on each server

Answer: A. Scan servers with Nmap

4- NMAP -sn 192.168.11.200-215
The NMAP command above performs which of the following?

A. A ping scan
B. A trace sweep
C. An operating system detect
D. A port scan

Answer: A. A ping scan

5- You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

Answer: nmap -sT -O -T0 (T0 least noise, sT means TCP connect scan)

6- . If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use
A. -r
B. -F (Scan only those ports listed in nmap_services file)
C. -sP (Ping scan)
D. -P (Specify ports)

Answer: -P (Specify ports)




Related Link=> Previous post of Ethical Hacker Examination Que & Ans
Part-7
Part-6 , Part-5 , Part-4 , Part-3 , Part-2 , Part-1

7- What would you enter if you wanted to perform a stealth scan using Nmap

Answer: nmap –sS (sS means stealth scan)

8- . Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system. While doing a technical assessment to determine network vulnerabilities, you used the TCP XMAS scan. What would be the response of all open ports?
A. The port will send an ACK
B. The port will send a SYN
C. The port will ignore the packets
D. The port will send an RST

Answer: C. The port will ignore the packets

9- An attacker scans a host with the below command. Which three flags are set
# nmap -sX host.domain.com

A. This is Xmas scan. SYN and ACK flags are set.
B. This is SYN scan. SYN flag is set.
C. This is Xmas scan. URG, PUSH and FIN are set.
D. This is ACK scan. ACK flag is set.

Answer: This is Xmas scan. URG, PUSH and FIN are set.

10- . Which of the following will perform an Xmas scan using NMAP? (sX means Xmas)
A. nmap -sA 192.168.1.254 (ACK Scan)
B. nmap -sP 192.168.1.254 (Ping scan)
C. nmap -sX 192.168.1.254
D. nmap -sV 192.168.1.254 (Version detection)

Answer: B. nmap -sP 192.168.1.254 (Ping scan)




Related Link ,See once

SECURITY TOOLS -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
Cyber Security Introduction
Cyber Security
Science
>>> CONTACT US < <<