Page | 1
ITN 261 Final Questions and Verified
Answers
Question: A packet flagged with the FIN flag signals:
Ans: the end or clearing of a connection.
Question: A technique that has existed for more than 25 years as a footprinting tool and
involves the use of modems is called:
Ans: Wardialing
Question: Bits that are set in the header of a packet, each describing a specific behavior are
calleed:
Ans: flags
Question: The Nmap command -T Paranoid performs which of the following scans?
Ans: Serial scan; 300 seconds between scans
Question: The Nmap command -sP performs which of the following scans?
Ans: Ping scan
Question: The practice of identifying the operating system of a networked device through
either passive or active techniques is called:
Ans: OS identification
Question: The process of sending ping requests to a series of devices or to the entire range
of networked devices is called a:
Ans: ping sweep.
Question: Which of the following Nmap commands does not perform a parallel scan?
Ans: -T Sneaky
, Page | 2
Question: Which of the following excels at allowing the security professional to find
services that have been redirected from standard ports?
Ans: THC-Amap
Question: Which of the following is NOT a network mapping tool?
Ans: Conquistador
Question: Which of the following is NOT a step in planning an attack on a target?
Ans: Set up a deny all access control to block all traffic to all ports unless such traffic has
been explicitly approved
Question: Which of the following is NOT one of the ways to identify active machines on
the network?
Ans: Firewall testing
Question: Which of the following is a Windows-based port scanner designed to scan TCP
and UDP ports, perform ping scans, run Whois queries, and use Traceroute?
Ans: Superscan
Question: Which of the following is a form of OS fingerprinting that involves actively
requesting information from the target system?
Ans: Active fingerprinting
Question: Which of the following is a method of identifying the OS of a targeted computer
or device in which no traffic or packets are injected into the network and attackers simply
listen to and analyze existing traffic?
Ans: Passive fingerprinting
Question: Which of the following is the process of locating wireless access points and
gaining information about the configurationof each?
Ans: Wardriving
Question: Which of the following is unique among network scanners because it scans ports
in parallel using what is known as stateless scanning?
ITN 261 Final Questions and Verified
Answers
Question: A packet flagged with the FIN flag signals:
Ans: the end or clearing of a connection.
Question: A technique that has existed for more than 25 years as a footprinting tool and
involves the use of modems is called:
Ans: Wardialing
Question: Bits that are set in the header of a packet, each describing a specific behavior are
calleed:
Ans: flags
Question: The Nmap command -T Paranoid performs which of the following scans?
Ans: Serial scan; 300 seconds between scans
Question: The Nmap command -sP performs which of the following scans?
Ans: Ping scan
Question: The practice of identifying the operating system of a networked device through
either passive or active techniques is called:
Ans: OS identification
Question: The process of sending ping requests to a series of devices or to the entire range
of networked devices is called a:
Ans: ping sweep.
Question: Which of the following Nmap commands does not perform a parallel scan?
Ans: -T Sneaky
, Page | 2
Question: Which of the following excels at allowing the security professional to find
services that have been redirected from standard ports?
Ans: THC-Amap
Question: Which of the following is NOT a network mapping tool?
Ans: Conquistador
Question: Which of the following is NOT a step in planning an attack on a target?
Ans: Set up a deny all access control to block all traffic to all ports unless such traffic has
been explicitly approved
Question: Which of the following is NOT one of the ways to identify active machines on
the network?
Ans: Firewall testing
Question: Which of the following is a Windows-based port scanner designed to scan TCP
and UDP ports, perform ping scans, run Whois queries, and use Traceroute?
Ans: Superscan
Question: Which of the following is a form of OS fingerprinting that involves actively
requesting information from the target system?
Ans: Active fingerprinting
Question: Which of the following is a method of identifying the OS of a targeted computer
or device in which no traffic or packets are injected into the network and attackers simply
listen to and analyze existing traffic?
Ans: Passive fingerprinting
Question: Which of the following is the process of locating wireless access points and
gaining information about the configurationof each?
Ans: Wardriving
Question: Which of the following is unique among network scanners because it scans ports
in parallel using what is known as stateless scanning?