0
[{"id":413188,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is the sequence of the three-way handshake?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":"A three-way handshake is part of every TCP connection and happens at the beginning of every connection. It includes the sequence SYN, SYN-ACK, ACK to be fully completed.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413189,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is an ICMP echo scan?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":"An ICMP echo scan is a ping sweep-type scan.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413190,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"Which best describes a vulnerability scan?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":"Vulnerability scans are designed to pick up weaknesses in a system. They are typically automated.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413187,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"A full-open scan means that the three-way handshake has been completed. What is the difference between this and a half-open scan?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":"A three-way handshake is part of every TCP connection and happens at the beginning of every connection. In the case of a half-open scan, however, a final ACK is not sent, therefore leaving the connection halfway complete.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413192,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is Tor used for?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":"Tor is designed to hide the process of scanning as well as the origin of a scan. In addition, it can provide encryption services to hide the traffic itself.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413186,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is the three-way handshake?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":"The three-way handshake happens at the beginning of every TCP connection.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413196,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"nmap is required to perform what type of scan?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":12,"explanation":"Nmap is designed to perform scans against ports on a system or group of systems,but it is by far the most popular tool in many categories.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413193,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"Why would you need to use a proxy to perform scanning?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":9,"explanation":"You do not need to use a proxy to perform scanning, but using one will hide the process of scanning and make it more difficult to monitor by the victim or other parties.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413185,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"During a Xmas tree scan what indicates a port is closed?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":"An RST indicates the port is closed in many of the TCP scan types. The RST is sent in response to a connection request and the RST indicates that the port is not available.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413195,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"A banner can do what?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":11,"explanation":"A banner can be changed on many services, keeping them from being easily identified. If this is not done, it is possible to use tools such as Telnet to gain information about a service and use that information to fine-tune an attack.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413178,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:20","updated_at":"2018-03-23 06:35:06","questionName":"Which of the following is used for identifying a web server OS?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":14,"explanation":"Netcraft is used to gather information about many aspects of a system, including operating system, IP address, and even country of origin.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413194,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"A vulnerability scan is a good way to do what?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":10,"explanation":"Vulnerability scanners are necessary for a security person to use to strengthen their systems by finding weaknesses before an attacker does.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413177,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:20","updated_at":"2018-03-23 06:35:06","questionName":"Which of the following is used for banner grabbing?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":13,"explanation":"Telnet is used to perform banner grabs against a system. However, other tools are available to do this as well.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413191,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"What is the purpose of a proxy?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":"A proxy is used to hide the party launching a scan.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":413184,"quiz_id":"21010","answer_id":null,"answerType_id":"0","created_at":"2018-03-23 06:34:21","updated_at":"2018-03-23 06:35:06","questionName":"During an FIN scan, what indicates that a port is closed?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":"An RST indicates that the port is closed.","question_score_id":null,"lang":null,"questionAudioPath":null}]