Question 103

- (Topic 3)
Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.
The tool uses raw IP packets to determine the following:
What ports are open on our network systems.
What hosts are available on the network.
Identify unauthorized wireless access points.
What services (application name and version) those hosts are offering.
What operating systems (and OS versions) they are running.
What type of packet filters/firewalls are in use.
Which of the following tools is Victor using?

Correct Answer:A

Question 104

- (Topic 3)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Correct Answer:C

Question 105

- (Topic 4)
You want to run the nmap command that includes the host specification of 202.176.56-57.*. How many hosts will you scan?

Correct Answer:C

Question 106

- (Topic 3)
Which of the following tools can be used by a user to hide his identity?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ACE

Question 107

- (Topic 4)
You want to run the nmap command that includes the host specification of 202.176.56-57.*. How many hosts will you scan?

Correct Answer:B

Question 108

- (Topic 4)
Which of the following statements about SSID is NOT true?

Correct Answer:A

START GPEN EXAM