Scanning Networks

Scanning Networks

Professional Development

10 Qs

quiz-placeholder

Similar activities

Impact of Implementing Data in Organisations

Impact of Implementing Data in Organisations

Professional Development

10 Qs

GUESS THAT WORD IN CYBER!

GUESS THAT WORD IN CYBER!

Professional Development

10 Qs

Technical Support Quiz NZ

Technical Support Quiz NZ

Professional Development

15 Qs

Forms

Forms

Professional Development

11 Qs

Mobile Offline Sync - OutSystems

Mobile Offline Sync - OutSystems

Professional Development

10 Qs

Sec+ CH.2 Review Test

Sec+ CH.2 Review Test

Professional Development

15 Qs

Physical Security Controls

Physical Security Controls

Professional Development

10 Qs

தகவல் தொடர்புத் தொழில் நுட்பம் (ஆண்டு 5)

தகவல் தொடர்புத் தொழில் நுட்பம் (ஆண்டு 5)

1st Grade - Professional Development

10 Qs

Scanning Networks

Scanning Networks

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Om Das

Used 8+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of network scanning in ethical hacking?

Gaining unauthorized access to target systems

Identifying vulnerabilities in network devices

Conducting social engineering attacks on network users

Performing denial-of-service attacks on target networks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scanning techniques sends TCP SYN packets to determine open ports on a target system?

Ping sweep

ACK scan

SYN scan

Xmas scan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scanning technique involves sending ICMP Echo Request packets to identify live hosts on a network?

Xmas scan

FIN scan

Ping sweep

TCP Connect scan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of OS fingerprinting during network scanning?

Identifying the operating system running on a target system

Enumerating open ports and services on a target system

Gathering information about the target organization's employees

Exploiting vulnerabilities in network protocols

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scanning technique allows for stealthy scanning by exploiting the way some firewalls handle fragmented IP packets?

ACK scan

Xmas scan

FIN scan

Idle scan

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which port scanning technique sends a TCP RST packet to determine if a specific port is open or closed on a target system?

NULL scan

UDP scan

TCP Connect scan

RST scan

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scanning technique is used to identify open UDP ports on a target system?

SYN scan

FIN scan

UDP scan

Xmas scan

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?