Unit 3 - Practice Quiz

INT245 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which of the following creates a 'half-open' connection to determine if a port is open, making it less likely to be logged by the target system?

A. TCP SYN Scan (-sS)
B. Ping Scan (-sn)
C. UDP Scan (-sU)
D. TCP Connect Scan (-sT)

2 When analyzing vulnerability scan results, what is a False Positive?

A. The scanner fails to identify an existing vulnerability.
B. The scanner correctly identifies a critical vulnerability.
C. The scanner identifies a vulnerability that does not actually exist.
D. The scanner crashes the target service.

3 Which open-source vulnerability scanner was originally a fork of the last open-source version of Nessus?

A. Burp Suite
B. Nexpose
C. OpenVAS
D. Qualys

4 In the context of Nmap timing templates used for evasion, which flag represents 'Paranoid' mode, sending packets very slowly to evade IDS?

A. -T0
B. -T5
C. -T1
D. -T3

5 Why are automated scanners generally poor at detecting Business Logic Vulnerabilities?

A. Logic flaws are only found in compiled code, not web apps.
B. Scanners do not support HTTP POST requests.
C. Scanners cannot decrypt SSL/TLS traffic.
D. Logic flaws depend on context and intended workflow, not syntax errors.

6 Which command allows an attacker to clear the command history in a Linux environment to cover tracks?

A. clear
B. ls -la
C. history -c
D. cat /dev/null

7 What is the primary difference between a Credentialed Scan and a Non-Credentialed Scan?

A. Credentialed scans log in to the system to audit local settings and patches.
B. Credentialed scans are illegal.
C. Non-credentialed scans are faster but cause more network traffic.
D. Non-credentialed scans can read the registry and configuration files.

8 Which CVSS v3.1 score range represents a Critical severity vulnerability?

A.
B.
C.
D.

9 Which Nmap technique involves sending packets from the attacker's IP mixed with packets from other spoofed IP addresses to confuse the target's IDS/Firewall?

A. Source Port Manipulation (--source-port)
B. Packet Fragmentation (-f)
C. Decoy Scanning (-D)
D. MAC Address Spoofing (--spoof-mac)

10 Which tool is specifically designed for scanning web servers for dangerous files, outdated server software, and default configuration problems?

A. Kismet
B. Wireshark
C. John the Ripper
D. Nikto

11 An attacker changes the source port of their packets to 53. What evasion technique is this, and why might it work?

A. Source Port Manipulation; firewalls may trust traffic from DNS ports.
B. Timing attack; it speeds up the scan.
C. Fragmentation; it splits the header.
D. Decoy scanning; it hides the IP address.

12 In a vulnerability assessment, what does deduplication refer to?

A. Copying the report to multiple servers.
B. Removing critical vulnerabilities from the report.
C. Consolidating multiple reports of the same vulnerability on the same host into a single finding.
D. Running the scan twice to ensure accuracy.

13 What is the purpose of Packet Fragmentation (-f) in Nmap during a scan?

A. To corrupt the target file system.
B. To increase scanning speed.
C. To split TCP headers into smaller fragments to bypass packet filters/firewalls.
D. To verify the MTU size of the network.

14 Which of the following is considered a Logical Vulnerability?

A. Insecure Direct Object Reference (IDOR) allowing access to another user's bill.
B. Buffer Overflow in the search parameter.
C. Missing X-Frame-Options header.
D. Using an outdated version of Apache.

15 Which Windows command is used to manipulate or clear event logs?

A. netstat
B. rm -rf
C. chmod
D. wevtutil

16 What is the difference between a Vulnerability Scan and a Penetration Test?

A. They are exactly the same.
B. A scan is automated and identifies potential issues; a pentest involves manual exploitation to verify risks.
C. A scan is manual; a pentest is automated.
D. A scan is more expensive than a pentest.

17 Which specific Nmap script engine (NSE) category is safe to run on a production network without likely causing a crash?

A. safe
B. exploit
C. dos
D. vuln

18 When interpreting vulnerability data, which metric defines the complexity required to exploit the vulnerability?

A. Attack Vector (AV)
B. User Interaction (UI)
C. Attack Complexity (AC)
D. Privileges Required (PR)

19 Which scan type is most likely to cause a Denial of Service (DoS) on unstable legacy equipment?

A. Discovery scan
B. Intrusive / Aggressive scan
C. Passive sniffing
D. Host discovery

20 In the context of covering tracks, what is Time Stomping?

A. Deleting the time server.
B. Slowing down the CPU.
C. Modifying the timestamp (access, modify, create) of a file to hide when it was used.
D. Running a scan at 3:00 AM.

21 Which tool is essentially a suite of tools centered around a web proxy, used for manual web application security testing?

A. Burp Suite
B. Nmap
C. Nessus
D. Snort

22 What is a False Negative in scanning results?

A. The scanner cannot connect to the host.
B. The scanner reports a vulnerability that exists.
C. The scanner fails to identify a vulnerability that actually exists.
D. The scanner reports a vulnerability that does not exist.

23 Which scanning technique determines the operating system of the target by analyzing the TCP/IP stack implementation responses?

A. OS Fingerprinting
B. Zone Transfer
C. Banner Grabbing
D. Port Sweeping

24 To perform an 'Idle Scan' (zombie scan) using Nmap to stay completely invisible, which flag is used?

A. -sN
B. -sA
C. -sZ
D. -sI

25 When analyzing results, a vulnerability with a high CVSS score but no known exploit code is generally prioritized:

A. Higher than a low score vulnerability with an active exploit.
B. As 'Informational' only.
C. As a False Positive.
D. Lower than a medium score vulnerability with an active exploit being used in the wild.

26 Which of the following is a method to cover tracks on a web server?

A. Using nmap -T4.
B. Running ipconfig.
C. Modifying the User-Agent string to look like a standard browser.
D. Sending SQL injection queries.

27 Which mathematical equation represents the number of possible ports in a TCP/IP connection?

A.
B.
C.
D.

28 What is the primary function of the Common Vulnerabilities and Exposures (CVE) list?

A. To sell antivirus software.
B. To provide a scoring system for severity.
C. To provide a dictionary of common names for publicly known cybersecurity vulnerabilities.
D. To list all IP addresses of hackers.

29 A scanner detects that http://target.com/admin returns a 200 OK status code without requiring a password. This is an example of:

A. SQL Injection
B. Buffer Overflow
C. Cross-Site Scripting (XSS)
D. Broken Access Control / Authentication Bypass

30 Which Nmap scan type is characterized by sending packets with no flags set (Null scan)?

A. -sF
B. -sN
C. -sX
D. -sP

31 Which tool is commonly used for automated SQL injection and database takeover during a vulnerability scan?

A. SQLMap
B. Hydra
C. Wireshark
D. Aircrack-ng

32 In the context of evasion, what is Steganography?

A. Using a VPN.
B. Spoofing MAC addresses.
C. Encrypting the hard drive.
D. Hiding data (or malicious code) within another file, such as an image or audio file.

33 Which component of the CVSS score is NOT constant and changes over time?

A. Base Score
B. Temporal Score
C. Impact Subscore
D. Vector String

34 What is the specific risk of running a UDP Scan (-sU) compared to a TCP scan?

A. It is incredibly slow because open ports often don't respond and closed ports send ICMP errors which are rate-limited.
B. It is always faster.
C. It requires authentication.
D. It cannot detect open ports.

35 A vulnerability report shows 'Apache 2.4.49' is running. This information was likely gathered via:

A. Source Code Review
B. Social Engineering
C. Heuristic Analysis
D. Service Banner Grabbing

36 Which of the following is a technique to evade Network Access Control (NAC) by impersonating a printer or VoIP phone?

A. MAC Spoofing
B. IP Fragmentation
C. Cross-Site Scripting
D. Null Scan

37 What is the purpose of a Proxy Chain in the context of scanning and evasion?

A. To route traffic through multiple intermediate servers to hide the attacker's true IP.
B. To speed up the connection.
C. To chain multiple exploits together.
D. To decrypt SSL traffic.

38 Which logical vulnerability occurs when an application checks for a condition (like balance > 0) but the state changes before the action is completed?

A. SQL Injection
B. Path Traversal
C. Race Condition
D. XSS

39 In a vulnerability scan report, 'Severity' is usually a combination of:

A. TCP and UDP
B. Impact and Likelihood
C. Source and Destination
D. Cost and Time

40 Which type of scan focuses solely on identifying live hosts on a network range without checking for open ports?

A. Compliance Scan
B. Port Scan
C. Ping Sweep / Discovery Scan
D. Vulnerability Scan

41 What is the function of the command rm ~/.bash_history?

A. It deletes the user's command history file to hide executed commands.
B. It updates the system.
C. It deletes the Linux kernel.
D. It removes the bash shell.

42 Which tool would be best suited for analyzing the results of a vulnerability scan and prioritizing remediation based on asset value?

A. A Vulnerability Management Platform (e.g., Tenable.sc)
B. Metasploit
C. Nmap
D. Netcat

43 If an attacker wants to scan a target behind a firewall that drops all incoming SYN packets, which scan might succeed by sending ACK packets to map firewall rules?

A. Version Scan
B. Stealth Scan
C. TCP Connect Scan
D. TCP ACK Scan (-sA)

44 What is a compliance scan?

A. A scan run by the government.
B. A scan that checks if the system meets specific configuration standards (like PCI-DSS or CIS Benchmarks).
C. A scan that checks for malware.
D. A scan that is legally required every day.

45 Which vulnerability arises from trusting user input without validation, allowing script execution in the victim's browser?

A. Cross-Site Scripting (XSS)
B. Man-in-the-Middle
C. Buffer Overflow
D. SQL Injection

46 When covering tracks, why might an attacker use a Rootkit?

A. To crack passwords faster.
B. To scan the network faster.
C. To encrypt the data for ransom.
D. To maintain persistent, privileged access while hiding processes and files from the OS.

47 Which of the following describes Parameter Manipulation?

A. Flooding the network with packets.
B. Scanning for open ports.
C. Changing the URL query string values (e.g., price=100 to price=1) to exploit logic.
D. Guessing passwords.

48 In Nmap, what does the flag -p- denote?

A. Scan ports 1-1024.
B. Scan only popular ports.
C. Scan no ports (Ping only).
D. Scan all 65,535 ports.

49 Which tool is primarily a framework for developing and executing exploit code against a remote target machine?

A. Metasploit Framework
B. Nessus
C. Wireshark
D. John the Ripper

50 During scanning, what is the 'Christmas Tree' scan (-sX)?

A. A scan sent only on holidays.
B. A scan with the FIN, URG, and PSH flags set to 'on'.
C. A scan that logs all data.
D. A scan that uses red and green packets.