Unit 3 - Practice Quiz

INT245 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which of the following creates a 'half-open' connection to determine if a port is open, making it less likely to be logged by the target system?

A. TCP Connect Scan (-sT)
B. TCP SYN Scan (-sS)
C. UDP Scan (-sU)
D. Ping Scan (-sn)

2 When analyzing vulnerability scan results, what is a False Positive?

A. The scanner fails to identify an existing vulnerability.
B. The scanner identifies a vulnerability that does not actually exist.
C. The scanner crashes the target service.
D. The scanner correctly identifies a critical vulnerability.

3 Which open-source vulnerability scanner was originally a fork of the last open-source version of Nessus?

A. OpenVAS
B. Qualys
C. Nexpose
D. Burp Suite

4 In the context of Nmap timing templates used for evasion, which flag represents 'Paranoid' mode, sending packets very slowly to evade IDS?

A. -T5
B. -T3
C. -T1
D. -T0

5 Why are automated scanners generally poor at detecting Business Logic Vulnerabilities?

A. Scanners cannot decrypt SSL/TLS traffic.
B. Logic flaws depend on context and intended workflow, not syntax errors.
C. Scanners do not support HTTP POST requests.
D. Logic flaws are only found in compiled code, not web apps.

6 Which command allows an attacker to clear the command history in a Linux environment to cover tracks?

A. history -c
B. clear
C. cat /dev/null
D. ls -la

7 What is the primary difference between a Credentialed Scan and a Non-Credentialed Scan?

A. Credentialed scans are illegal.
B. Non-credentialed scans are faster but cause more network traffic.
C. Credentialed scans log in to the system to audit local settings and patches.
D. Non-credentialed scans can read the registry and configuration files.

8 Which CVSS v3.1 score range represents a Critical severity vulnerability?

A.
B.
C.
D.

9 Which Nmap technique involves sending packets from the attacker's IP mixed with packets from other spoofed IP addresses to confuse the target's IDS/Firewall?

A. Packet Fragmentation (-f)
B. Decoy Scanning (-D)
C. Source Port Manipulation (--source-port)
D. MAC Address Spoofing (--spoof-mac)

10 Which tool is specifically designed for scanning web servers for dangerous files, outdated server software, and default configuration problems?

A. Nikto
B. Kismet
C. Wireshark
D. John the Ripper

11 An attacker changes the source port of their packets to 53. What evasion technique is this, and why might it work?

A. Decoy scanning; it hides the IP address.
B. Source Port Manipulation; firewalls may trust traffic from DNS ports.
C. Fragmentation; it splits the header.
D. Timing attack; it speeds up the scan.

12 In a vulnerability assessment, what does deduplication refer to?

A. Running the scan twice to ensure accuracy.
B. Consolidating multiple reports of the same vulnerability on the same host into a single finding.
C. Removing critical vulnerabilities from the report.
D. Copying the report to multiple servers.

13 What is the purpose of Packet Fragmentation (-f) in Nmap during a scan?

A. To increase scanning speed.
B. To verify the MTU size of the network.
C. To split TCP headers into smaller fragments to bypass packet filters/firewalls.
D. To corrupt the target file system.

14 Which of the following is considered a Logical Vulnerability?

A. Buffer Overflow in the search parameter.
B. Insecure Direct Object Reference (IDOR) allowing access to another user's bill.
C. Using an outdated version of Apache.
D. Missing X-Frame-Options header.

15 Which Windows command is used to manipulate or clear event logs?

A. chmod
B. rm -rf
C. wevtutil
D. netstat

16 What is the difference between a Vulnerability Scan and a Penetration Test?

A. They are exactly the same.
B. A scan is automated and identifies potential issues; a pentest involves manual exploitation to verify risks.
C. A scan is manual; a pentest is automated.
D. A scan is more expensive than a pentest.

17 Which specific Nmap script engine (NSE) category is safe to run on a production network without likely causing a crash?

A. vuln
B. dos
C. exploit
D. safe

18 When interpreting vulnerability data, which metric defines the complexity required to exploit the vulnerability?

A. Attack Vector (AV)
B. Attack Complexity (AC)
C. Privileges Required (PR)
D. User Interaction (UI)

19 Which scan type is most likely to cause a Denial of Service (DoS) on unstable legacy equipment?

A. Passive sniffing
B. Discovery scan
C. Intrusive / Aggressive scan
D. Host discovery

20 In the context of covering tracks, what is Time Stomping?

A. Slowing down the CPU.
B. Modifying the timestamp (access, modify, create) of a file to hide when it was used.
C. Deleting the time server.
D. Running a scan at 3:00 AM.

21 Which tool is essentially a suite of tools centered around a web proxy, used for manual web application security testing?

A. Burp Suite
B. Nmap
C. Snort
D. Nessus

22 What is a False Negative in scanning results?

A. The scanner reports a vulnerability that exists.
B. The scanner reports a vulnerability that does not exist.
C. The scanner fails to identify a vulnerability that actually exists.
D. The scanner cannot connect to the host.

23 Which scanning technique determines the operating system of the target by analyzing the TCP/IP stack implementation responses?

A. Banner Grabbing
B. OS Fingerprinting
C. Port Sweeping
D. Zone Transfer

24 To perform an 'Idle Scan' (zombie scan) using Nmap to stay completely invisible, which flag is used?

A. -sI
B. -sZ
C. -sA
D. -sN

25 When analyzing results, a vulnerability with a high CVSS score but no known exploit code is generally prioritized:

A. Higher than a low score vulnerability with an active exploit.
B. Lower than a medium score vulnerability with an active exploit being used in the wild.
C. As a False Positive.
D. As 'Informational' only.

26 Which of the following is a method to cover tracks on a web server?

A. Using nmap -T4.
B. Modifying the User-Agent string to look like a standard browser.
C. Sending SQL injection queries.
D. Running ipconfig.

27 Which mathematical equation represents the number of possible ports in a TCP/IP connection?

A.
B.
C.
D.

28 What is the primary function of the Common Vulnerabilities and Exposures (CVE) list?

A. To provide a dictionary of common names for publicly known cybersecurity vulnerabilities.
B. To provide a scoring system for severity.
C. To sell antivirus software.
D. To list all IP addresses of hackers.

29 A scanner detects that http://target.com/admin returns a 200 OK status code without requiring a password. This is an example of:

A. Cross-Site Scripting (XSS)
B. Broken Access Control / Authentication Bypass
C. SQL Injection
D. Buffer Overflow

30 Which Nmap scan type is characterized by sending packets with no flags set (Null scan)?

A. -sN
B. -sF
C. -sX
D. -sP

31 Which tool is commonly used for automated SQL injection and database takeover during a vulnerability scan?

A. Hydra
B. SQLMap
C. Wireshark
D. Aircrack-ng

32 In the context of evasion, what is Steganography?

A. Encrypting the hard drive.
B. Hiding data (or malicious code) within another file, such as an image or audio file.
C. Using a VPN.
D. Spoofing MAC addresses.

33 Which component of the CVSS score is NOT constant and changes over time?

A. Base Score
B. Temporal Score
C. Vector String
D. Impact Subscore

34 What is the specific risk of running a UDP Scan (-sU) compared to a TCP scan?

A. It is always faster.
B. It is incredibly slow because open ports often don't respond and closed ports send ICMP errors which are rate-limited.
C. It cannot detect open ports.
D. It requires authentication.

35 A vulnerability report shows 'Apache 2.4.49' is running. This information was likely gathered via:

A. Heuristic Analysis
B. Service Banner Grabbing
C. Source Code Review
D. Social Engineering

36 Which of the following is a technique to evade Network Access Control (NAC) by impersonating a printer or VoIP phone?

A. MAC Spoofing
B. IP Fragmentation
C. Null Scan
D. Cross-Site Scripting

37 What is the purpose of a Proxy Chain in the context of scanning and evasion?

A. To speed up the connection.
B. To route traffic through multiple intermediate servers to hide the attacker's true IP.
C. To decrypt SSL traffic.
D. To chain multiple exploits together.

38 Which logical vulnerability occurs when an application checks for a condition (like balance > 0) but the state changes before the action is completed?

A. Race Condition
B. SQL Injection
C. XSS
D. Path Traversal

39 In a vulnerability scan report, 'Severity' is usually a combination of:

A. Cost and Time
B. Impact and Likelihood
C. Source and Destination
D. TCP and UDP

40 Which type of scan focuses solely on identifying live hosts on a network range without checking for open ports?

A. Vulnerability Scan
B. Ping Sweep / Discovery Scan
C. Port Scan
D. Compliance Scan

41 What is the function of the command rm ~/.bash_history?

A. It deletes the Linux kernel.
B. It deletes the user's command history file to hide executed commands.
C. It removes the bash shell.
D. It updates the system.

42 Which tool would be best suited for analyzing the results of a vulnerability scan and prioritizing remediation based on asset value?

A. A Vulnerability Management Platform (e.g., Tenable.sc)
B. Nmap
C. Netcat
D. Metasploit

43 If an attacker wants to scan a target behind a firewall that drops all incoming SYN packets, which scan might succeed by sending ACK packets to map firewall rules?

A. TCP ACK Scan (-sA)
B. TCP Connect Scan
C. Stealth Scan
D. Version Scan

44 What is a compliance scan?

A. A scan that checks if the system meets specific configuration standards (like PCI-DSS or CIS Benchmarks).
B. A scan that checks for malware.
C. A scan that is legally required every day.
D. A scan run by the government.

45 Which vulnerability arises from trusting user input without validation, allowing script execution in the victim's browser?

A. SQL Injection
B. Cross-Site Scripting (XSS)
C. Buffer Overflow
D. Man-in-the-Middle

46 When covering tracks, why might an attacker use a Rootkit?

A. To crack passwords faster.
B. To maintain persistent, privileged access while hiding processes and files from the OS.
C. To scan the network faster.
D. To encrypt the data for ransom.

47 Which of the following describes Parameter Manipulation?

A. Changing the URL query string values (e.g., price=100 to price=1) to exploit logic.
B. Guessing passwords.
C. Flooding the network with packets.
D. Scanning for open ports.

48 In Nmap, what does the flag -p- denote?

A. Scan only popular ports.
B. Scan all 65,535 ports.
C. Scan no ports (Ping only).
D. Scan ports 1-1024.

49 Which tool is primarily a framework for developing and executing exploit code against a remote target machine?

A. Metasploit Framework
B. Nessus
C. Wireshark
D. John the Ripper

50 During scanning, what is the 'Christmas Tree' scan (-sX)?

A. A scan sent only on holidays.
B. A scan with the FIN, URG, and PSH flags set to 'on'.
C. A scan that uses red and green packets.
D. A scan that logs all data.