Scanning Networks

Scanning Networks

Professional Development

10 Qs

quiz-placeholder

Similar activities

Linux Command Line Quiz

Linux Command Line Quiz

Professional Development

14 Qs

Post Test Teknologi Jaringan Berbasis Luas

Post Test Teknologi Jaringan Berbasis Luas

12th Grade - Professional Development

11 Qs

COMPUTER & INTERNET ESSENTIAL

COMPUTER & INTERNET ESSENTIAL

Professional Development

10 Qs

Computer Network Test

Computer Network Test

University - Professional Development

11 Qs

IT Security Awareness

IT Security Awareness

Professional Development

10 Qs

Fundamental Connectivity for AM online Class

Fundamental Connectivity for AM online Class

University - Professional Development

15 Qs

Latihan UP SIJA

Latihan UP SIJA

Professional Development

13 Qs

Cloud computing 2

Cloud computing 2

Professional Development

10 Qs

Scanning Networks

Scanning Networks

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Om Das

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of network scanning in ethical hacking?

Gaining unauthorized access to target systems

Identifying vulnerabilities in network devices

Conducting social engineering attacks on network users

Performing denial-of-service attacks on target networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scanning techniques sends TCP SYN packets to determine open ports on a target system?

Ping sweep

ACK scan

SYN scan

Xmas scan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scanning technique involves sending ICMP Echo Request packets to identify live hosts on a network?

Xmas scan

FIN scan

Ping sweep

TCP Connect scan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of OS fingerprinting during network scanning?

Identifying the operating system running on a target system

Enumerating open ports and services on a target system

Gathering information about the target organization's employees

Exploiting vulnerabilities in network protocols

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scanning technique allows for stealthy scanning by exploiting the way some firewalls handle fragmented IP packets?

ACK scan

Xmas scan

FIN scan

Idle scan

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which port scanning technique sends a TCP RST packet to determine if a specific port is open or closed on a target system?

NULL scan

UDP scan

TCP Connect scan

RST scan

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scanning technique is used to identify open UDP ports on a target system?

SYN scan

FIN scan

UDP scan

Xmas scan

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?