Scanning Networks

Scanning Networks

Professional Development

10 Qs

quiz-placeholder

Similar activities

Pre- Test Digital Up-Skill

Pre- Test Digital Up-Skill

Professional Development

10 Qs

Komputer jaringan dasar

Komputer jaringan dasar

Professional Development

15 Qs

HINO - Measuring Digital Marketing Success Through Analytics

HINO - Measuring Digital Marketing Success Through Analytics

Professional Development

15 Qs

G Suite

G Suite

4th Grade - Professional Development

13 Qs

Social Dilemma

Social Dilemma

8th Grade - Professional Development

14 Qs

EMERGING TECHNOLOGIES QUIZ #2 MIDTERM (IV-B)

EMERGING TECHNOLOGIES QUIZ #2 MIDTERM (IV-B)

University - Professional Development

15 Qs

Module 4 - HUMINT

Module 4 - HUMINT

Professional Development

10 Qs

AD

AD

Professional Development

10 Qs

Scanning Networks

Scanning Networks

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Om Das

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of network scanning in ethical hacking?

Gaining unauthorized access to target systems

Identifying vulnerabilities in network devices

Conducting social engineering attacks on network users

Performing denial-of-service attacks on target networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scanning techniques sends TCP SYN packets to determine open ports on a target system?

Ping sweep

ACK scan

SYN scan

Xmas scan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scanning technique involves sending ICMP Echo Request packets to identify live hosts on a network?

Xmas scan

FIN scan

Ping sweep

TCP Connect scan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of OS fingerprinting during network scanning?

Identifying the operating system running on a target system

Enumerating open ports and services on a target system

Gathering information about the target organization's employees

Exploiting vulnerabilities in network protocols

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scanning technique allows for stealthy scanning by exploiting the way some firewalls handle fragmented IP packets?

ACK scan

Xmas scan

FIN scan

Idle scan

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which port scanning technique sends a TCP RST packet to determine if a specific port is open or closed on a target system?

NULL scan

UDP scan

TCP Connect scan

RST scan

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scanning technique is used to identify open UDP ports on a target system?

SYN scan

FIN scan

UDP scan

Xmas scan

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?