NMAP Familiarity CEH 1.5

NMAP Familiarity CEH 1.5

Professional Development

10 Qs

quiz-placeholder

Similar activities

Enumeration

Enumeration

Professional Development

10 Qs

DST09 - Day 2 Quiz

DST09 - Day 2 Quiz

Professional Development

15 Qs

cyberops14

cyberops14

Professional Development

10 Qs

General Printing

General Printing

Professional Development

15 Qs

IT ENGLISH: Technical Terminology - Ad Hoc Network

IT ENGLISH: Technical Terminology - Ad Hoc Network

Professional Development

10 Qs

Online threats

Online threats

Professional Development

15 Qs

GUESS THAT WORD IN CYBER!

GUESS THAT WORD IN CYBER!

Professional Development

10 Qs

Module 2A. Active Reconnaissance - Scanning

Module 2A. Active Reconnaissance - Scanning

Professional Development

15 Qs

NMAP Familiarity CEH 1.5

NMAP Familiarity CEH 1.5

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Prem Jadhwani

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MATCH QUESTION

3 mins • 1 pt

Match the following

Threat Feed

The process of addressing and mitigating security threats or vulnerabilities in a system or network.

Threat Remediation

A stream of real-time or regularly updated information about current and emerging cybersecurity threats.

Attack Surface

An individual, group, or entity that carries out malicious activities with the intent to compromise the security of a system or network.

Attack Vector

the sum of all the points or areas in a system, network, or application that are vulnerable to potential security threats.

Threat Actor

The method or pathway that an attacker employs to exploit vulnerabilities in a system or network to carry out an attack.

2.

MATCH QUESTION

3 mins • 1 pt

Match these general terms:

Fingerprinting

A term used to define the technique of finding very detailed information about a target on a network.

Active Reconnaissance

A term used to define the technique of mapping out a network.

Footprinting

Taking information from publicly available websites and web pages.

Passive Reconnaissance

Involves actively probing the target systems to gather information. This may include network scanning, port scanning, and other techniques to discover live hosts, open ports, and services.

Web Scraping

Involves collecting information without directly interacting with the target. This can include searching public records, social media profiles, WHOIS databases, and other publicly available sources.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NMAP's default scan is often referred to as a vanilla scan. Nmap attempts to establish a full TCP connection with the target host for the most common 1,000 TCP ports. This scan is executed if you do not provide any arguments. Example: nmap [target]. What is this scan known as?

XMAS Tree Scan

SYN Stealth Scan

TCP Connect Scan

UDP Scan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NMAP not used for?

Port Discovery

Active Reconnaissance

Forging TCP Packets

Host Discovery

5.

MATCH QUESTION

3 mins • 1 pt

Match the timing templates to the correct speeds for NMAP scans.

t5 - Insane

  • Faster and more aggressive than the default.

  • Can increase the likelihood of detection but provides quicker results.

t2 - Polite

  • Slower than the default.

  • Intended to be stealthy but still reasonably fast.

t4 - Aggressive

  • A balanced and moderate timing template.

  • It is often a good choice for general-purpose scanning.

t1 - Sneaky

  • Default timing template.

  • Balances speed with caution to avoid causing disruption.

t3 - Normal

  • Very fast and aggressive.

  • Increases the chances of being detected and can put a heavier load on the network and target system.

Answer explanation

t0 - Paranoid:

  • Very slow and cautious.

  • Designed to minimize the chances of detection by the target system.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This term is used when a threat actor is attempting to discover and map the active hosts or devices on a network. The threat actors goal is to make a complete map so that they can accurately assess the attack surface of an organization.

Footprinting

Fingerprinting

Port Discovery

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By default, NMAP performs host discovery to see what computers are available to scan. This argument assumes that the host is already online, directing the NMAP program to skip looking for the host and proceed straight to port scanning.

-sS

-sV

-A

-Pn

Answer explanation

-sS = TCP Syn Port Scan

-sV = Version Scan

-A = OS Detection Scan

-Pn = Port Scan Only, No Host

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?