
NMAP Familiarity CEH 1.5
Authored by Prem Jadhwani
Computers
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MATCH QUESTION
3 mins • 1 pt
Match the following
Threat Feed
An individual, group, or entity that carries out malicious activities with the intent to compromise the security of a system or network.
Threat Remediation
the sum of all the points or areas in a system, network, or application that are vulnerable to potential security threats.
Threat Actor
The method or pathway that an attacker employs to exploit vulnerabilities in a system or network to carry out an attack.
Attack Vector
A stream of real-time or regularly updated information about current and emerging cybersecurity threats.
Attack Surface
The process of addressing and mitigating security threats or vulnerabilities in a system or network.
2.
MATCH QUESTION
3 mins • 1 pt
Match these general terms:
Active Reconnaissance
Taking information from publicly available websites and web pages.
Web Scraping
Involves collecting information without directly interacting with the target. This can include searching public records, social media profiles, WHOIS databases, and other publicly available sources.
Passive Reconnaissance
Involves actively probing the target systems to gather information. This may include network scanning, port scanning, and other techniques to discover live hosts, open ports, and services.
Fingerprinting
A term used to define the technique of mapping out a network.
Footprinting
A term used to define the technique of finding very detailed information about a target on a network.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
NMAP's default scan is often referred to as a vanilla scan. Nmap attempts to establish a full TCP connection with the target host for the most common 1,000 TCP ports. This scan is executed if you do not provide any arguments. Example: nmap [target]. What is this scan known as?
XMAS Tree Scan
SYN Stealth Scan
TCP Connect Scan
UDP Scan
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NMAP not used for?
Port Discovery
Active Reconnaissance
Forging TCP Packets
Host Discovery
5.
MATCH QUESTION
3 mins • 1 pt
Match the timing templates to the correct speeds for NMAP scans.
t5 - Insane
Default timing template.
Balances speed with caution to avoid causing disruption.
t4 - Aggressive
Slower than the default.
Intended to be stealthy but still reasonably fast.
t2 - Polite
Faster and more aggressive than the default.
Can increase the likelihood of detection but provides quicker results.
t1 - Sneaky
A balanced and moderate timing template.
It is often a good choice for general-purpose scanning.
t3 - Normal
Very fast and aggressive.
Increases the chances of being detected and can put a heavier load on the network and target system.
Answer explanation
t0 - Paranoid:
Very slow and cautious.
Designed to minimize the chances of detection by the target system.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This term is used when a threat actor is attempting to discover and map the active hosts or devices on a network. The threat actors goal is to make a complete map so that they can accurately assess the attack surface of an organization.
Footprinting
Fingerprinting
Port Discovery
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
By default, NMAP performs host discovery to see what computers are available to scan. This argument assumes that the host is already online, directing the NMAP program to skip looking for the host and proceed straight to port scanning.
-sS
-sV
-A
-Pn
Answer explanation
-sS = TCP Syn Port Scan
-sV = Version Scan
-A = OS Detection Scan
-Pn = Port Scan Only, No Host
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Day 3 C Programming quiz
Quiz
•
Professional Development
10 questions
Fun and Interesting Facts about Technology
Quiz
•
University - Professi...
10 questions
1 - Introducing SCRUM in SAFe
Quiz
•
Professional Development
11 questions
Types of Mass Media
Quiz
•
10th Grade - Professi...
10 questions
Pengenalan Digital Marketing
Quiz
•
KG - Professional Dev...
10 questions
Friday Fun
Quiz
•
Professional Development
11 questions
Technology Morning Tea Quiz
Quiz
•
KG - Professional Dev...
10 questions
SQL Commands - SELECT Statements
Quiz
•
Professional Development
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Computers
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L5_22-23
Lesson
•
KG - Professional Dev...
10 questions
March Quiz
Quiz
•
Professional Development
5 questions
Copy of G5_U6_L8_22-23
Lesson
•
KG - Professional Dev...
10 questions
suffixes FUL OR LESS
Quiz
•
Professional Development