Search Header Logo

NMAP Familiarity CEH 1.5

Authored by Prem Jadhwani

Computers

Professional Development

Used 2+ times

NMAP Familiarity CEH 1.5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MATCH QUESTION

3 mins • 1 pt

Match the following

Threat Feed

An individual, group, or entity that carries out malicious activities with the intent to compromise the security of a system or network.

Threat Remediation

the sum of all the points or areas in a system, network, or application that are vulnerable to potential security threats.

Threat Actor

The method or pathway that an attacker employs to exploit vulnerabilities in a system or network to carry out an attack.

Attack Vector

A stream of real-time or regularly updated information about current and emerging cybersecurity threats.

Attack Surface

The process of addressing and mitigating security threats or vulnerabilities in a system or network.

2.

MATCH QUESTION

3 mins • 1 pt

Match these general terms:

Active Reconnaissance

Taking information from publicly available websites and web pages.

Web Scraping

Involves collecting information without directly interacting with the target. This can include searching public records, social media profiles, WHOIS databases, and other publicly available sources.

Passive Reconnaissance

Involves actively probing the target systems to gather information. This may include network scanning, port scanning, and other techniques to discover live hosts, open ports, and services.

Fingerprinting

A term used to define the technique of mapping out a network.

Footprinting

A term used to define the technique of finding very detailed information about a target on a network.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NMAP's default scan is often referred to as a vanilla scan. Nmap attempts to establish a full TCP connection with the target host for the most common 1,000 TCP ports. This scan is executed if you do not provide any arguments. Example: nmap [target]. What is this scan known as?

XMAS Tree Scan

SYN Stealth Scan

TCP Connect Scan

UDP Scan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NMAP not used for?

Port Discovery

Active Reconnaissance

Forging TCP Packets

Host Discovery

5.

MATCH QUESTION

3 mins • 1 pt

Match the timing templates to the correct speeds for NMAP scans.

t5 - Insane

  • Default timing template.

  • Balances speed with caution to avoid causing disruption.

t4 - Aggressive

  • Slower than the default.

  • Intended to be stealthy but still reasonably fast.

t2 - Polite

  • Faster and more aggressive than the default.

  • Can increase the likelihood of detection but provides quicker results.

t1 - Sneaky

  • A balanced and moderate timing template.

  • It is often a good choice for general-purpose scanning.

t3 - Normal

  • Very fast and aggressive.

  • Increases the chances of being detected and can put a heavier load on the network and target system.

Answer explanation

t0 - Paranoid:

  • Very slow and cautious.

  • Designed to minimize the chances of detection by the target system.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This term is used when a threat actor is attempting to discover and map the active hosts or devices on a network. The threat actors goal is to make a complete map so that they can accurately assess the attack surface of an organization.

Footprinting

Fingerprinting

Port Discovery

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By default, NMAP performs host discovery to see what computers are available to scan. This argument assumes that the host is already online, directing the NMAP program to skip looking for the host and proceed straight to port scanning.

-sS

-sV

-A

-Pn

Answer explanation

-sS = TCP Syn Port Scan

-sV = Version Scan

-A = OS Detection Scan

-Pn = Port Scan Only, No Host

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?