NMAP Familiarity CEH 1.5

NMAP Familiarity CEH 1.5

Professional Development

10 Qs

quiz-placeholder

Similar activities

Pentest Fundamentals 28/03/2024

Pentest Fundamentals 28/03/2024

Professional Development

6 Qs

Module 1. Passive Reconnaissance

Module 1. Passive Reconnaissance

Professional Development

15 Qs

System Ethical Hacking

System Ethical Hacking

Professional Development

10 Qs

Denial of Service

Denial of Service

Professional Development

15 Qs

Gerenciamento de pacotes no Debian com APT

Gerenciamento de pacotes no Debian com APT

Professional Development

13 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

EHVA Tut 2

EHVA Tut 2

Professional Development

15 Qs

ITF - Quiz 13.2 - Preventing Malware Infections

ITF - Quiz 13.2 - Preventing Malware Infections

Professional Development

14 Qs

NMAP Familiarity CEH 1.5

NMAP Familiarity CEH 1.5

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Prem Jadhwani

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MATCH QUESTION

3 mins • 1 pt

Match the following

Threat Feed

The method or pathway that an attacker employs to exploit vulnerabilities in a system or network to carry out an attack.

Attack Surface

An individual, group, or entity that carries out malicious activities with the intent to compromise the security of a system or network.

Attack Vector

A stream of real-time or regularly updated information about current and emerging cybersecurity threats.

Threat Remediation

The process of addressing and mitigating security threats or vulnerabilities in a system or network.

Threat Actor

the sum of all the points or areas in a system, network, or application that are vulnerable to potential security threats.

2.

MATCH QUESTION

3 mins • 1 pt

Match these general terms:

Fingerprinting

Involves collecting information without directly interacting with the target. This can include searching public records, social media profiles, WHOIS databases, and other publicly available sources.

Web Scraping

Taking information from publicly available websites and web pages.

Footprinting

Involves actively probing the target systems to gather information. This may include network scanning, port scanning, and other techniques to discover live hosts, open ports, and services.

Passive Reconnaissance

A term used to define the technique of mapping out a network.

Active Reconnaissance

A term used to define the technique of finding very detailed information about a target on a network.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NMAP's default scan is often referred to as a vanilla scan. Nmap attempts to establish a full TCP connection with the target host for the most common 1,000 TCP ports. This scan is executed if you do not provide any arguments. Example: nmap [target]. What is this scan known as?

XMAS Tree Scan

SYN Stealth Scan

TCP Connect Scan

UDP Scan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NMAP not used for?

Port Discovery

Active Reconnaissance

Forging TCP Packets

Host Discovery

5.

MATCH QUESTION

3 mins • 1 pt

Match the timing templates to the correct speeds for NMAP scans.

t4 - Aggressive

  • Very fast and aggressive.

  • Increases the chances of being detected and can put a heavier load on the network and target system.

t2 - Polite

  • Slower than the default.

  • Intended to be stealthy but still reasonably fast.

t1 - Sneaky

  • Faster and more aggressive than the default.

  • Can increase the likelihood of detection but provides quicker results.

t5 - Insane

  • Default timing template.

  • Balances speed with caution to avoid causing disruption.

t3 - Normal

  • A balanced and moderate timing template.

  • It is often a good choice for general-purpose scanning.

Answer explanation

t0 - Paranoid:

  • Very slow and cautious.

  • Designed to minimize the chances of detection by the target system.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This term is used when a threat actor is attempting to discover and map the active hosts or devices on a network. The threat actors goal is to make a complete map so that they can accurately assess the attack surface of an organization.

Footprinting

Fingerprinting

Port Discovery

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By default, NMAP performs host discovery to see what computers are available to scan. This argument assumes that the host is already online, directing the NMAP program to skip looking for the host and proceed straight to port scanning.

-sS

-sV

-A

-Pn

Answer explanation

-sS = TCP Syn Port Scan

-sV = Version Scan

-A = OS Detection Scan

-Pn = Port Scan Only, No Host

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?