CEH: Ch. 5

Exit

Question 1 of 1

  Time Left


0 [{"id":413188,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is the sequence of the three-way handshake?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":"A three-way handshake is part of every TCP connection and happens at the beginning of every connection. It includes the sequence SYN, SYN-ACK, ACK to be fully completed.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413184,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"During an FIN scan, what indicates that a port is closed?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":"An RST indicates that the port is closed.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413189,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is an ICMP echo scan?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":"An ICMP echo scan is a ping sweep-type scan.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413193,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"Why would you need to use a proxy to perform scanning?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":9,"explanation":"You do not need to use a proxy to perform scanning, but using one will hide the process of scanning and make it more difficult to monitor by the victim or other parties.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413187,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"A full-open scan means that the three-way handshake has been completed. What is the difference between this and a half-open scan?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":"A three-way handshake is part of every TCP connection and happens at the beginning of every connection. In the case of a half-open scan, however, a final ACK is not sent, therefore leaving the connection halfway complete.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413177,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:20","updated_at":"2018-03-23 06:35:06","questionName":"Which of the following is used for banner grabbing?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":13,"explanation":"Telnet is used to perform banner grabs against a system. However, other tools are available to do this as well.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413196,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"nmap is required to perform what type of scan?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":12,"explanation":"Nmap is designed to perform scans against ports on a system or group of systems,but it is by far the most popular tool in many categories.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413185,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"During a Xmas tree scan what indicates a port is closed?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":"An RST indicates the port is closed in many of the TCP scan types. The RST is sent in response to a connection request and the RST indicates that the port is not available.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413190,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"Which best describes a vulnerability scan?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":"Vulnerability scans are designed to pick up weaknesses in a system. They are typically automated.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413178,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:20","updated_at":"2018-03-23 06:35:06","questionName":"Which of the following is used for identifying a web server OS?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":14,"explanation":"Netcraft is used to gather information about many aspects of a system, including operating system, IP address, and even country of origin.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413186,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is the three-way handshake?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":"The three-way handshake happens at the beginning of every TCP connection.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413194,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"A vulnerability scan is a good way to do what?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":10,"explanation":"Vulnerability scanners are necessary for a security person to use to strengthen their systems by finding weaknesses before an attacker does.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413191,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is the purpose of a proxy?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":"A proxy is used to hide the party launching a scan.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413192,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is Tor used for?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":"Tor is designed to hide the process of scanning as well as the origin of a scan. In addition, it can provide encryption services to hide the traffic itself.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413195,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"A banner can do what?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":11,"explanation":"A banner can be changed on many services, keeping them from being easily identified. If this is not done, it is possible to use tools such as Telnet to gain information about a service and use that information to fine-tune an attack.","question_score_id":null,"lang":null,"questionAudioPath":null}]
413188
0
60
block

What is the sequence of the three-way handshake?

Select the Correct Answers  

(0/0)


























413184
0
60
none
413189
0
60
none
413193
0
60
none
413187
0
60
none
413177
0
60
none
413196
0
60
none
413185
0
60
none
413190
0
60
none
413178
0
60
none
413186
0
60
none
413194
0
60
none
413191
0
60
none
413192
0
60
none
413195
0
60
none