Network Scanning Quiz

Network Scanning Quiz

University

44 Qs

quiz-placeholder

Similar activities

CYB125 - Ch8

CYB125 - Ch8

University

39 Qs

Networking Concepts Quiz

Networking Concepts Quiz

University

39 Qs

pretest

pretest

University

49 Qs

Kiến thức về giao thức mạng

Kiến thức về giao thức mạng

University

44 Qs

PART 6: DATA LINK LAYER AND PHYSICAL LAYER

PART 6: DATA LINK LAYER AND PHYSICAL LAYER

University

45 Qs

Quiz sobre Redes

Quiz sobre Redes

University

41 Qs

Datalink and MAC Quiz

Datalink and MAC Quiz

University

46 Qs

Network Scanning Quiz

Network Scanning Quiz

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Usman Ali

Used 1+ times

FREE Resource

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the module objectives, what is the primary goal of network scanning?

To gain administrative access to a server.

To identify live hosts, open ports, and services on a network.

To launch a Denial-of-Service (DoS) attack.

To encrypt network traffic.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which TCP flag is used to initiate a connection between two hosts as part of the three-way handshake?

ACK

FIN

RST

SYN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the TCP communication process, what is the purpose of the RST flag?

To acknowledge the receipt of a packet.

To initiate a new connection.

To reset or terminate a connection abruptly.

To indicate the end of data transmission.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the correct sequence of packets in a successful TCP three-way handshake?

SYN -> ACK -> SYN-ACK

SYN -> SYN-ACK -> ACK

FIN -> FIN-ACK -> ACK

SYN -> RST -> ACK

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attackers use packet crafting tools like Colasoft Packet Builder to create fragmented packets for what primary purpose?

To increase the speed of the network.

To create backups of network configurations.

To bypass firewalls and Intrusion Detection Systems (IDS).

To test the physical network cabling.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are traditional network scanning techniques considered computationally less feasible on IPv6 networks?

IPv6 packets cannot be fragmented.

All IPv6 traffic is encrypted by default.

The vastly larger address space (2^64 hosts per subnet) makes brute-force scanning impractical.

Most scanning tools do not support the IPv6 header format.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which popular command-line tool is used for network discovery and security auditing, with capabilities for host discovery, port scanning, and OS detection?

Wireshark

Nmap

Netcat

Hping3

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)