Where would this IDS be a good fit? Should you place it on a network or on a specific host? Explain your answer.
Understand system security scanning Fingerprint an operating system and TCP/IP stack Identify system vulnerabilities
Use discovery tools Plan a system assessment
What is system security scanning? a. The process of methodically detecting all systems in a particular subnet b. The process of methodically assessing a system to find any known vulnerability c. Periodically scanning vulnerabilities databases for new or updated threats d. Examining each file stored on a file system for virus signatures
What is the process of detecting the operating system of a remote computer called? a. OS detection b. OS scanning c. OS fingerprinting d. OS assessment
What are the common techniques for determining a remote computer’s operating system? [Choose all that apply.] a. Send specially crafted network packets and examine the responses. b. Send a message asking what the operating system is. c. Send a network packet, ignore the responses, and then evaluate the way the target handles retransmitted packets. d. Read all packets sent by the target computer until an informative packet is found.