CEH: Ch. 5

Exit

Question 1 of 1

  Time Left


0 [{"id":413186,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is the three-way handshake?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":"The three-way handshake happens at the beginning of every TCP connection.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413177,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:20","updated_at":"2018-03-23 06:35:06","questionName":"Which of the following is used for banner grabbing?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":13,"explanation":"Telnet is used to perform banner grabs against a system. However, other tools are available to do this as well.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413184,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"During an FIN scan, what indicates that a port is closed?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":"An RST indicates that the port is closed.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413196,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"nmap is required to perform what type of scan?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":12,"explanation":"Nmap is designed to perform scans against ports on a system or group of systems,but it is by far the most popular tool in many categories.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413193,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"Why would you need to use a proxy to perform scanning?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":9,"explanation":"You do not need to use a proxy to perform scanning, but using one will hide the process of scanning and make it more difficult to monitor by the victim or other parties.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413187,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"A full-open scan means that the three-way handshake has been completed. What is the difference between this and a half-open scan?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":"A three-way handshake is part of every TCP connection and happens at the beginning of every connection. In the case of a half-open scan, however, a final ACK is not sent, therefore leaving the connection halfway complete.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413188,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is the sequence of the three-way handshake?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":"A three-way handshake is part of every TCP connection and happens at the beginning of every connection. It includes the sequence SYN, SYN-ACK, ACK to be fully completed.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413192,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is Tor used for?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":"Tor is designed to hide the process of scanning as well as the origin of a scan. In addition, it can provide encryption services to hide the traffic itself.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413195,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"A banner can do what?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":11,"explanation":"A banner can be changed on many services, keeping them from being easily identified. If this is not done, it is possible to use tools such as Telnet to gain information about a service and use that information to fine-tune an attack.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413191,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is the purpose of a proxy?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":"A proxy is used to hide the party launching a scan.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413194,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"A vulnerability scan is a good way to do what?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":10,"explanation":"Vulnerability scanners are necessary for a security person to use to strengthen their systems by finding weaknesses before an attacker does.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413178,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:20","updated_at":"2018-03-23 06:35:06","questionName":"Which of the following is used for identifying a web server OS?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":14,"explanation":"Netcraft is used to gather information about many aspects of a system, including operating system, IP address, and even country of origin.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413190,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"Which best describes a vulnerability scan?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":"Vulnerability scans are designed to pick up weaknesses in a system. They are typically automated.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413189,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is an ICMP echo scan?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":"An ICMP echo scan is a ping sweep-type scan.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413185,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"During a Xmas tree scan what indicates a port is closed?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":"An RST indicates the port is closed in many of the TCP scan types. The RST is sent in response to a connection request and the RST indicates that the port is not available.","question_score_id":null,"lang":null,"questionAudioPath":null}]
413186
0
60
block

What is the three-way handshake?

Select the correct answer(s).  

(0/0)












413177
0
60
none
413184
0
60
none
413196
0
60
none
413193
0
60
none
413187
0
60
none
413188
0
60
none
413192
0
60
none
413195
0
60
none
413191
0
60
none
413194
0
60
none
413178
0
60
none
413190
0
60
none
413189
0
60
none
413185
0
60
none