Week 11 Flashcards

Cloud monitoring and diagnostics 2. (15 cards)

1
Q

Define network scanning and state two key reasons why it is performed.

A

Network scanning is the process of identifying live systems, open ports, services, and vulnerabilities on a network. It is performed to assess security weaknesses and to map the network for monitoring or penetration testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Differentiate between port scanning, network scanning, and vulnerability scanning.

A

Port scanning: identifies open ports/services. Network scanning: identifies active hosts and their IPs. Vulnerability scanning: detects known weaknesses or security flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain how an attacker can use network mapping tools during a penetration test

A

Attackers use network mapping tools to discover devices, locate weak points, identify running services, and build diagrams of targets to plan attack paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main purpose of IDS evasion, and give one example of how it can be achieved.

A

IDS evasion aims to avoid or bypass intrusion detection systems. Example: slowing scan speeds to appear as normal traffic (low-and-slow scanning).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is FastResolver effective for footprinting a network?

A

Because it resolves multiple hostnames to IPs (and vice versa) and can scan entire IP ranges to identify active hosts and MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe two scenarios where remote desktop operations are essential in enterprise environments.

A

(1) Remote troubleshooting by technicians.
(2) Accessing workplace computers from home for administrative or work purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TeamViewer is commonly used in IT support. What risk does this introduce if misconfigured?

A

Unauthorized remote access, which can allow attackers full control of systems if credentials are weak or exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain how the tool Dude assists network administrators.

A

Dude scans entire subnets, maps devices visually, monitors services, and alerts administrators of device failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What advantage does LANState offer that makes it suitable for corporate environments?

A

It provides network mapping, monitoring, and can export diagrams to formats like Visio, supporting documentation and compliance requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is Friendly Pinger useful for continuous monitoring?

A

It provides visual availability status, parallel pinging, notifications when devices go up/down, and tracks software/hardware inventory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the purpose of Ipsoner in enterprise networks.

A

It discovers managed and unmanaged network assets, identifying unknown or rogue devices across the network perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What key benefit does WhatsUpGold provide for IT auditing?

A

It automatically discovers, maps, inventories, and documents network devices, supporting regulatory compliance and network transparency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What capabilities make NetMaster effective for mobile network diagnostics?

A

LAN scanning, TCP connect scanning, ARP scanning, Bonjour discovery, and cellular/Wi-Fi speed testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain how proxies help attackers hide their identity during an attack.

A

Proxies mask the attacker’s real IP, forward requests on their behalf, and can be chained to prevent tracing back to the source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly