2.0 - Vulnerability Management Exam with verified detailed
|| || || || || || ||
answers
||
Megan wants to use the Metasploit Framework to conduct a web application vulnerability scan.
|| || || || || || || || || || || || || ||
What module from the following list is best suited to her needs?
|| || || || || || || || || || || ||
A. smb_login B. Angry IP C. nmap D. wmap - ✔✔D. wmap
|| || || || || || || || || || ||
What flag does nmap use to enable operating system identification?
|| || || || || || || || || ||
A. -os B. -id C. -O D. -osscan - ✔✔D. -osscan
|| || || || || || || || || ||
What command-line tool can be used to determine the path that traffic takes to a remote system?
|| || || || || || || || || || || || || || || || ||
A. Whois B. traceroute C. nslookup D. routeview - ✔✔B. traceroute
|| || || || || || || || || ||
. Valerie wants to use a graphical interface to control nmap and wants to display her scans as a
|| || || || || || || || || || || || || || || || || || ||
visual map to help her understand her target networks. What tool from the following list should
|| || || || || || || || || || || || || || || ||
she use? || ||
A. Angry IP Scanner B. wmap C. Zenmap D. nmap-gs - ✔✔C. Zenmap
|| || || || || || || || || || || ||
Susan runs an nmap scan using the following command: nmap -O -Pn 192.168.1.0/255 What
|| || || || || || || || || || || || || ||
information will she see about the hosts she scans? || || || || || || || || ||
A. The hostname and service ports
|| || || || || ||
B. The hostname, service ports, and operating system
|| || || || || || || ||
C. The hostname and operating system
|| || || || || ||
, 2
D. The hostname, uptime, and logged-in user - ✔✔B. The hostname, service ports, and operating
|| || || || || || || || || || || || || || ||
system
Tuan wants to gather additional information about a domain that he has entered in Maltego. What
|| || || || || || || || || || || || || || || ||
functionality is used to perform server-based actions in Maltego? || || || || || || || || ||
A. A worker B. A query C. A transform D. A scan - ✔✔C. A transform
|| || || || || || || || || || || || || || ||
Laura wants to conduct a search for hosts using Recon-ng but wants to leverage a search engine
|| || || || || || || || || || || || || || || || ||
with API access to acquire existing data. What module should she use?
|| || || || || || || || || || || ||
A. recon/companies-multi/whois_miner
|| ||
B. import/nmap
|| ||
C. recon/domains-hosts/shodan_hostname
|| ||
D. import/list - ✔✔C. recon/domains-hosts/shodan_hostname
|| || || ||
After running an nmap scan, Geoff sees ports 80 and 443 open on a system he scanned. What
|| || || || || || || || || || || || || || || || || ||
reasonable guess can he make about the system based on this result?
|| || || || || || || || || || || ||
A. The system is a Windows system. B. The system is running a database server. C. The system is
|| || || || || || || || || || || || || || || || || || ||
a Linux system. D. The system is running a web server. - ✔✔D. The system is running a web
|| || || || || || || || || || || || || || || || || || ||
server.
What information is used to identify network segments and topology when conducting an nmap
|| || || || || || || || || || || || || ||
scan? ||
A. IP addresses B. Hostnames C. Time to live D. Port numbers - ✔✔C. Time to live
|| || || || || || || || || || || || || || || ||