You are on page 1of 4

Teaching and Learning Activity: Suggested Solutions

Module: Praxis S3A (HPXS301-1)


Week number (Date): 3 (26 August 2021)
Lesson(s) covered: Chapter 5 and Chapter 6

Instructions:
To enrich your learning experience at Boston even further, and to ensure that you are exposed
to a variety of resources in this module, announcements will be posted every week containing
additional materials or activities for you to work through.

It is important to note that these activities are neither compulsory nor weighted, but that it will be
to your advantage to participate. The purpose of the activities is to help you better understand
the content of your weekly unit/s of study, and it will assist in creating insight and deeper
meaning.

Activity 3 is based on Chapter 5 and Chapter 6 of the prescribed courseware for this module.

Question 1

What vulnerability is used by hackers when wardialling?

A. Lack of trust in organisations


B. Modems are not securable devices
C. Modems are still used today as backup for internet
D. Fax machines use modems
Answer C page 66

1 HPXS301-1-July-Dec2021-T&L-W3-Memo-StM-V1-24082021
Question 2

Imagine that you are pen testing a network and you want to create a record of live systems
at that point in time. Which one of the following scanning tools would you use?

A. ifconfig
B. ping sweep
C. ping flood
D. ping list
Answer B page 67

Question 3

TCP is a connection-oriented protocol that uses a three-way handshake to establish a


connection with a system port. In the handshake routine involving two systems, which
flag indicates the initialising state of the process?
A. The BGN flag
B. The STRT flag
C. The SET flag
D. The SYN flag
Answer D page 67

Question 4

After establishing a connection, the receiving device must send a flag to make the sending
device send buffered data. Which one of the following flags achieves this purpose?

A. The SND flag


B. The ACK flag
C. The PSH flag
D. The NAK flag
Answer C page 67

2 HPXS301-1-July-Dec2021-T&L-W3-Memo-StM-V1-24082021
Question 5

Website and email footprinting can provide details on information flow, operating
systems, filenames, and network connections. Which one of the following foot printing
tools can a hacker use to find the hostnames and IP addresses and other technical
points of contact?
A. whois
B. nslookup
C. dig
D. traceroute
Answer A page 61

Question 6

From the following terms, select one that is best related to the description “The process
of actively engaging with a target in an attempt to gather information about a network.”

A. Evasion
B. Scanning
C. Falsification
D. Probing

Answer B page 65

Question 7

From the following set of terms, identify one that is most closely related to “the extraction
and recording of information about a network or system.”

A. Scanning
B. Reconnaissance
C. Enumeration
D. Penetration
Answer C page 77

3 HPXS301-1-July-Dec2021-T&L-W3-Memo-StM-V1-24082021
Question 8

Identify an account type that “provides normal access to the network, but provides only
limited access to the local machine”.

A. Administrator
B. Local service
C. Network service
D. Guest
Answer C page 80

Question 9

In Linux systems, which command enables a hacker to obtain the specified user's login
name, real name, terminal name and write status, idle time, login time, office location,
and office phone number?

A. whois
B. finger
C. detail
D. point
Answer B page 82

Question 10

What does the UPDATE SNMP method do?

A. Verify that you are running the most recent version of SNMP at all times
B. Remove the SNMP agent or turn off the SNMP service completely
C. Block or monitor activity on all the ports as configured for SNMP traffic
D. Ensures that a server provides copies of zone files to only specific servers
Answer A page 88

4 HPXS301-1-July-Dec2021-T&L-W3-Memo-StM-V1-24082021

You might also like