Network Scanning Quiz

Network Scanning Quiz

University

44 Qs

quiz-placeholder

Similar activities

IAS MULTI PART I

IAS MULTI PART I

University

40 Qs

A+ Core II Days 7-9

A+ Core II Days 7-9

University

44 Qs

UTS Konfigurasi dan Administrasi Basis Data

UTS Konfigurasi dan Administrasi Basis Data

4th Grade - University

41 Qs

Quiz-Applied OS

Quiz-Applied OS

University

40 Qs

PEC Midterm Assessment

PEC Midterm Assessment

University

45 Qs

Usability Engineering Quiz

Usability Engineering Quiz

University

40 Qs

Digital Citizenship and Spreadsheets

Digital Citizenship and Spreadsheets

7th Grade - University

47 Qs

Kuis_03_IoT Bab 5-6

Kuis_03_IoT Bab 5-6

University

40 Qs

Network Scanning Quiz

Network Scanning Quiz

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

Usman Ali

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the module objectives, what is the primary goal of network scanning?

To gain administrative access to a server.

To identify live hosts, open ports, and services on a network.

To launch a Denial-of-Service (DoS) attack.

To encrypt network traffic.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which TCP flag is used to initiate a connection between two hosts as part of the three-way handshake?

ACK

FIN

RST

SYN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the TCP communication process, what is the purpose of the RST flag?

To acknowledge the receipt of a packet.

To initiate a new connection.

To reset or terminate a connection abruptly.

To indicate the end of data transmission.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the correct sequence of packets in a successful TCP three-way handshake?

SYN -> ACK -> SYN-ACK

SYN -> SYN-ACK -> ACK

FIN -> FIN-ACK -> ACK

SYN -> RST -> ACK

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attackers use packet crafting tools like Colasoft Packet Builder to create fragmented packets for what primary purpose?

To increase the speed of the network.

To create backups of network configurations.

To bypass firewalls and Intrusion Detection Systems (IDS).

To test the physical network cabling.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are traditional network scanning techniques considered computationally less feasible on IPv6 networks?

IPv6 packets cannot be fragmented.

All IPv6 traffic is encrypted by default.

The vastly larger address space (2^64 hosts per subnet) makes brute-force scanning impractical.

Most scanning tools do not support the IPv6 header format.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which popular command-line tool is used for network discovery and security auditing, with capabilities for host discovery, port scanning, and OS detection?

Wireshark

Nmap

Netcat

Hping3

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?