1.
Study the log below and identify the scan type.
2.
Why would an attacker want to perform a scan on port 137?
3.
Which Type of scan sends a packets with no flags set? Select the Answer
4.
Sandra has been actively scanning the client network on which she is doing a vulnerability assessment test. While conducting a port scan she notices open ports in the range of 135 to 139. What protocol is most likely to be listening on those ports?
5.
Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing server publishing?
6.
What is the following command used for? net use \targetipc$ /u:
7.
What is the proper response for a NULL scan if the port is closed?
8.
One of your team members has asked you to analyze the following SOA record. What is the TTL? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.
9.
One of your team members has asked you to analyze the following SOA record. What is the version? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.
10.
MX record priority increases as the number increases. (True/False.