100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CCTC Networking Exam Questions with All Correct Answers $12.49   Add to cart

Exam (elaborations)

CCTC Networking Exam Questions with All Correct Answers

 11 views  0 purchase
  • Course
  • CCTC Networking
  • Institution
  • CCTC Networking

CCTC Networking Exam Questions with All Correct Answers What is Social Proof? - Answer- People copy the actions of others in an attempt to undertake behavior in a given situation. What is Pretexting? - Answer- Pretexting is a form of social engineering in which an individual lies to obtain p...

[Show more]

Preview 2 out of 14  pages

  • October 3, 2024
  • 14
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CCTC Networking
  • CCTC Networking
avatar-seller
Scholarsstudyguide
CCTC Networking Exam
Questions with All Correct
Answers
What is Social Proof? - Answer- People copy the actions of others in an attempt to
undertake behavior in a given situation.

What is Pretexting? - Answer- Pretexting is a form of social engineering in which an
individual lies to obtain privileged data.
A pretext is a false motive.

Mental buffer-overflow - Answer- Mental Buffer-Overflow: layering loop
(stories/information) until the subject tunes out/can't keep track, inject bad stuff

What is a TCP Connect Scan? - Answer- attempts the three-way handshake with every
TCP port. Most easily detected.

What is a TCP half open scan? - Answer- determines if a port is open by performing the
first half of a three-way handshake. It is also referred to as SYN scanning.

What is a SYN scan? - Answer- The hostile client attempts to set up a TCP/IP
connection with a server at every possible
port. This is done by sending a SYN (synchronization) packet, as if to initiate a three-
way handshake, to every port on the server.

What is an ACK scan? - Answer- When a TCP ACK segment is sent to a closed port, or
sent out-of-sync to a listening port,
the RFC 793 expected behavior is for the device to respond with a RST.

What is a TCP Syn Scan? - Answer- Considered a "stealth" scan, It can be performed
quickly, scanning thousands of ports
per second on a fast network not hampered by intrusive firewalls.

What is a NULL or FIN scan? - Answer- When you send packets to each TCP port with
no flags set, the target responds with an RST
packet if the port is closed. If the port is open, the host ignores the packet, and no
response arrives.

, True or False: Illegal flag combinations can be used to determine OS - Answer- TRUE

True or False: Linux only sends RSTs if the port is closed - Answer- TRUE

What is NIPPER? - Answer- creates comprehensive audit reports on network
devices

True or Flase: Windows/Mac system ALWAYS send RSTs if the TCP segment isn't a
part of an established
communication - Answer- TRUE

What is shodon.io? - Answer- Shodan is a search engine that lets the user find specific
types of computers connected to the
internet using a variety of filters.

You have a file (file.txt) on a client (10.0.0.1) that you need to send to a remote system
(10.0.2), what secure copy command would accomplish this? - Answer- scp file.txt
username@10.0.0.2:/remote-directory/path

You need to receive a file (file.txt) from a remove client (10.0.0.2) to your local
client(10.0.0.1), what secure copy command would accomplish this? - Answer- scp
username@10.0.0.2:file.txt /local-directory/path

What is snort? - Answer- software based Intrusion Detection System

What command would set up a netcat listener to receive a file (newfile.txt) over port
9001? - Answer- nc -l -p 9001 > newfile.txt

What command would set up a netcat client to send file.txt to 10.0.0.2 over port 9001? -
Answer- nc 10.0.0.1 9001 < file.txt

What command would set up a netcat listener to send a file (newfile.txt) over port 9001?
- Answer- nc -l -p 9001 < newfile.txt

What command would set up a netcat client to receive file.txt from 10.0.0.2 over port
9001? - Answer- nc 10.0.0.2 9001 > file.txt

Command to establish a pipe named mypipe for use with netcat? - Answer- mknod
mypipe p

What command would set up a relay as a client for exchanging file between
10.0.0.3:9002 and 10.0.0.1:9001 over a local pipe named mypipe? - Answer- nc
10.0.0.3 9002 < mypipe | nc 10.0.0.1 9001 > mypipe

What ssh command would you need in order to utilize proxychains to scan a remote
host? - Answer- ssh -D 9050 user@pivotIP -NT

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart