NMAP Familiarity CEH 1.5

NMAP Familiarity CEH 1.5

Professional Development

10 Qs

quiz-placeholder

Similar activities

Network Attack

Network Attack

Professional Development

10 Qs

Pentesting 02 - Identifier les vulnérabilités

Pentesting 02 - Identifier les vulnérabilités

Professional Development

12 Qs

Chapter 6 Review Questions

Chapter 6 Review Questions

Professional Development

10 Qs

OB Funds Day 1

OB Funds Day 1

Professional Development

12 Qs

ITF - Quiz 9.1 - Network Components

ITF - Quiz 9.1 - Network Components

Professional Development

15 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

ITF - Quiz 13.2 - Preventing Malware Infections

ITF - Quiz 13.2 - Preventing Malware Infections

Professional Development

14 Qs

EHVA Tut 2

EHVA Tut 2

Professional Development

15 Qs

NMAP Familiarity CEH 1.5

NMAP Familiarity CEH 1.5

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Prem Jadhwani

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MATCH QUESTION

3 mins • 1 pt

Match the following

Threat Remediation

A stream of real-time or regularly updated information about current and emerging cybersecurity threats.

Attack Vector

the sum of all the points or areas in a system, network, or application that are vulnerable to potential security threats.

Threat Feed

The process of addressing and mitigating security threats or vulnerabilities in a system or network.

Attack Surface

The method or pathway that an attacker employs to exploit vulnerabilities in a system or network to carry out an attack.

Threat Actor

An individual, group, or entity that carries out malicious activities with the intent to compromise the security of a system or network.

2.

MATCH QUESTION

3 mins • 1 pt

Match these general terms:

Active Reconnaissance

A term used to define the technique of finding very detailed information about a target on a network.

Fingerprinting

Involves actively probing the target systems to gather information. This may include network scanning, port scanning, and other techniques to discover live hosts, open ports, and services.

Footprinting

Involves collecting information without directly interacting with the target. This can include searching public records, social media profiles, WHOIS databases, and other publicly available sources.

Web Scraping

A term used to define the technique of mapping out a network.

Passive Reconnaissance

Taking information from publicly available websites and web pages.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NMAP's default scan is often referred to as a vanilla scan. Nmap attempts to establish a full TCP connection with the target host for the most common 1,000 TCP ports. This scan is executed if you do not provide any arguments. Example: nmap [target]. What is this scan known as?

XMAS Tree Scan

SYN Stealth Scan

TCP Connect Scan

UDP Scan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NMAP not used for?

Port Discovery

Active Reconnaissance

Forging TCP Packets

Host Discovery

5.

MATCH QUESTION

3 mins • 1 pt

Match the timing templates to the correct speeds for NMAP scans.

t2 - Polite

  • Default timing template.

  • Balances speed with caution to avoid causing disruption.

t3 - Normal

  • A balanced and moderate timing template.

  • It is often a good choice for general-purpose scanning.

t1 - Sneaky

  • Slower than the default.

  • Intended to be stealthy but still reasonably fast.

t4 - Aggressive

  • Very fast and aggressive.

  • Increases the chances of being detected and can put a heavier load on the network and target system.

t5 - Insane

  • Faster and more aggressive than the default.

  • Can increase the likelihood of detection but provides quicker results.

Answer explanation

t0 - Paranoid:

  • Very slow and cautious.

  • Designed to minimize the chances of detection by the target system.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This term is used when a threat actor is attempting to discover and map the active hosts or devices on a network. The threat actors goal is to make a complete map so that they can accurately assess the attack surface of an organization.

Footprinting

Fingerprinting

Port Discovery

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By default, NMAP performs host discovery to see what computers are available to scan. This argument assumes that the host is already online, directing the NMAP program to skip looking for the host and proceed straight to port scanning.

-sS

-sV

-A

-Pn

Answer explanation

-sS = TCP Syn Port Scan

-sV = Version Scan

-A = OS Detection Scan

-Pn = Port Scan Only, No Host

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?