Scanning Networks

Scanning Networks

Professional Development

10 Qs

quiz-placeholder

Similar activities

Enumeration

Enumeration

Professional Development

10 Qs

EHVA Tut 2

EHVA Tut 2

Professional Development

15 Qs

ITF - Quiz 13.2 - Preventing Malware Infections

ITF - Quiz 13.2 - Preventing Malware Infections

Professional Development

14 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

CySA+ Command Line

CySA+ Command Line

Professional Development

8 Qs

Type of Attack Indicators

Type of Attack Indicators

Professional Development

10 Qs

CCNA OSI, TCP

CCNA OSI, TCP

Professional Development

5 Qs

Module 2A. Active Reconnaissance - Scanning

Module 2A. Active Reconnaissance - Scanning

Professional Development

15 Qs

Scanning Networks

Scanning Networks

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Om Das

Used 7+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of network scanning in ethical hacking?

Gaining unauthorized access to target systems

Identifying vulnerabilities in network devices

Conducting social engineering attacks on network users

Performing denial-of-service attacks on target networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scanning techniques sends TCP SYN packets to determine open ports on a target system?

Ping sweep

ACK scan

SYN scan

Xmas scan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scanning technique involves sending ICMP Echo Request packets to identify live hosts on a network?

Xmas scan

FIN scan

Ping sweep

TCP Connect scan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of OS fingerprinting during network scanning?

Identifying the operating system running on a target system

Enumerating open ports and services on a target system

Gathering information about the target organization's employees

Exploiting vulnerabilities in network protocols

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scanning technique allows for stealthy scanning by exploiting the way some firewalls handle fragmented IP packets?

ACK scan

Xmas scan

FIN scan

Idle scan

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which port scanning technique sends a TCP RST packet to determine if a specific port is open or closed on a target system?

NULL scan

UDP scan

TCP Connect scan

RST scan

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scanning technique is used to identify open UDP ports on a target system?

SYN scan

FIN scan

UDP scan

Xmas scan

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?