Unit3 - Subjective Questions

INT245 • Practice Questions with Detailed Answers

1

Differentiate between Credentialed and Non-Credentialed vulnerability scans. Discuss the advantages of each.

2

Explain the concept of Logical Vulnerabilities (Business Logic Flaws). Why are they difficult for automated tools to detect?

3

Discuss the significance of False Positives and False Negatives when analyzing scanning results. How should a penetration tester handle them?

4

Describe the Common Vulnerability Scoring System (CVSS) and its role in analyzing scanning results.

5

Explain the Nmap 'IDLE Scan' (Zombie Scan) technique used for evasion. How does it work?

6

What are the primary techniques used for Covering Tracks after a penetration test or attack? List at least four methods.

7

Compare Nmap and Nessus in terms of their primary function and usage in the scanning phase.

8

Describe the Fragmentation scanning technique and explain how it assists in evading detection systems (IDS/Firewalls).

9

What are Decoys in the context of network scanning? How does the Nmap -D option function?

10

Analyze the importance of Timing Templates in Nmap for evading detection. List the six timing templates.

11

Explain the functionality of Burp Suite in the context of scanning web applications. Focus on the 'Intruder' and 'Scanner' components.

12

Distinguish between Intrusive and Non-Intrusive scans. Provide examples of when to use each.

13

What is Steganography? How is it utilized in the 'Covering Tracks' phase of a penetration test?

14

Discuss the process of Triaging scanning results. What criteria are used to prioritize remediation?

15

Explain the concept of IP Spoofing and Source Routing as evasion techniques.

16

Describe OpenVAS (Open Vulnerability Assessment System) and its architecture.

17

What is the difference between Active and Passive scanning? Provide an example of a tool for each.

18

How can a penetration tester use Proxy Chains and Anonymizers to evade detection during scanning?

19

Explain the role of Metasploit in the context of vulnerability scanning. How does it differ from a dedicated scanner like Nessus?

20

In the context of 'Covering Tracks', what are Log Cleaning scripts? Why is simply deleting the log file (rm logfile) considered poor practice?