
7.3.2 - Recon with Scanning
Authored by Anthony DellaRosa
Computers
12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
38 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a Network Scanner?
To clean viruses from a network
To enumerate and fingerprint devices in a network to identify vulnerabilities
To increase the speed of the network
To monitor the data usage of a network
Answer explanation
A Network Scanner is used to enumerate and fingerprint devices in a network to identify vulnerabilities, not to clean viruses or increase network speed.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does enumeration in the context of network scanning involve?
Calculating the number of devices connected to a network
Identifying the computers in a network and trying to find details such as services, hostnames, file shares, usernames, etc.
Counting the number of files transferred over a network
Measuring the bandwidth usage of each device on a network
Answer explanation
Enumeration in the context of network scanning involves identifying the computers in a network and trying to find details such as services, hostnames, file shares, usernames, etc.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is fingerprinting in network scanning?
Tracking the physical location of network devices
Identifying the specific OS or application running on a system
Recording the serial numbers of all devices on a network
Creating a backup of system configurations
Answer explanation
Fingerprinting in network scanning involves identifying the specific OS or application running on a system, not tracking physical location or recording serial numbers.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the most popular network scanning tool mentioned in the document?
Wireshark
Zenmap
Nmap
Nessus
Answer explanation
The most popular network scanning tool mentioned in the document is Nmap, as it is the correct answer choice provided.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name of the GUI version of Nmap?
Wireshark GUI
NetScanner
Zenmap
NmapGUI
Answer explanation
The GUI version of Nmap is called Zenmap, making it the correct choice among the options provided.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Nmap primarily used for?
Monitoring network traffic
Sending emails
Scanning networks
Filtering spam
Answer explanation
Nmap is primarily used for scanning networks, not for monitoring network traffic, sending emails, or filtering spam.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the TCP 3-way handshake process start with?
SYN-ACK
ACK
SYN
Data transmission
Answer explanation
The TCP 3-way handshake process starts with the SYN packet being sent by the client to the server.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?