
NMAP Familiarity CEH 1.5
Quiz
•
Computers
•
Professional Development
•
Medium

Prem Jadhwani
Used 2+ times
FREE Resource
10 questions
Show all answers
1.
MATCH QUESTION
3 mins • 1 pt
Match the following
Threat Remediation
A stream of real-time or regularly updated information about current and emerging cybersecurity threats.
Attack Vector
the sum of all the points or areas in a system, network, or application that are vulnerable to potential security threats.
Threat Feed
The process of addressing and mitigating security threats or vulnerabilities in a system or network.
Attack Surface
The method or pathway that an attacker employs to exploit vulnerabilities in a system or network to carry out an attack.
Threat Actor
An individual, group, or entity that carries out malicious activities with the intent to compromise the security of a system or network.
2.
MATCH QUESTION
3 mins • 1 pt
Match these general terms:
Active Reconnaissance
A term used to define the technique of finding very detailed information about a target on a network.
Fingerprinting
Involves actively probing the target systems to gather information. This may include network scanning, port scanning, and other techniques to discover live hosts, open ports, and services.
Footprinting
Involves collecting information without directly interacting with the target. This can include searching public records, social media profiles, WHOIS databases, and other publicly available sources.
Web Scraping
A term used to define the technique of mapping out a network.
Passive Reconnaissance
Taking information from publicly available websites and web pages.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NMAP's default scan is often referred to as a vanilla scan. Nmap attempts to establish a full TCP connection with the target host for the most common 1,000 TCP ports. This scan is executed if you do not provide any arguments. Example: nmap [target]. What is this scan known as?
XMAS Tree Scan
SYN Stealth Scan
TCP Connect Scan
UDP Scan
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NMAP not used for?
Port Discovery
Active Reconnaissance
Forging TCP Packets
Host Discovery
5.
MATCH QUESTION
3 mins • 1 pt
Match the timing templates to the correct speeds for NMAP scans.
t2 - Polite
Default timing template.
Balances speed with caution to avoid causing disruption.
t3 - Normal
A balanced and moderate timing template.
It is often a good choice for general-purpose scanning.
t1 - Sneaky
Slower than the default.
Intended to be stealthy but still reasonably fast.
t4 - Aggressive
Very fast and aggressive.
Increases the chances of being detected and can put a heavier load on the network and target system.
t5 - Insane
Faster and more aggressive than the default.
Can increase the likelihood of detection but provides quicker results.
Answer explanation
t0 - Paranoid:
Very slow and cautious.
Designed to minimize the chances of detection by the target system.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This term is used when a threat actor is attempting to discover and map the active hosts or devices on a network. The threat actors goal is to make a complete map so that they can accurately assess the attack surface of an organization.
Footprinting
Fingerprinting
Port Discovery
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
By default, NMAP performs host discovery to see what computers are available to scan. This argument assumes that the host is already online, directing the NMAP program to skip looking for the host and proceed straight to port scanning.
-sS
-sV
-A
-Pn
Answer explanation
-sS = TCP Syn Port Scan
-sV = Version Scan
-A = OS Detection Scan
-Pn = Port Scan Only, No Host
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
15 questions
SEC+ Ch.6 Review Test
Quiz
•
Professional Development
14 questions
Network Fundamentals-Physical layer
Quiz
•
9th Grade - Professio...
15 questions
SEC+ Ch.8 Review Test
Quiz
•
Professional Development
10 questions
Scanning Networks
Quiz
•
Professional Development
10 questions
CompTIA Security+ 11-20
Quiz
•
Professional Development
10 questions
CEH Pre Assessment
Quiz
•
Professional Development
7 questions
CEH_mod3.1
Quiz
•
Professional Development
10 questions
Network Attack Indicators
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade