Network Scanning Quiz

Network Scanning Quiz

University

44 Qs

quiz-placeholder

Similar activities

Data Analytics Quiz

Data Analytics Quiz

University

40 Qs

Prelim: Project Management

Prelim: Project Management

University

46 Qs

Revision Quiz

Revision Quiz

University

40 Qs

CPT EP Quiz 2 (C1 Computer Architecture, C10 Network Addresses)

CPT EP Quiz 2 (C1 Computer Architecture, C10 Network Addresses)

9th Grade - University

40 Qs

BTUI'24 - Inter-school ICT Quiz - Quarter Finals

BTUI'24 - Inter-school ICT Quiz - Quarter Finals

12th Grade - University

40 Qs

ISD-topic 4

ISD-topic 4

University

40 Qs

ICT (midterm based)

ICT (midterm based)

University

43 Qs

TIK-9

TIK-9

8th Grade - University

40 Qs

Network Scanning Quiz

Network Scanning Quiz

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Usman Ali

Used 1+ times

FREE Resource

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the module objectives, what is the primary goal of network scanning?

To gain administrative access to a server.

To identify live hosts, open ports, and services on a network.

To launch a Denial-of-Service (DoS) attack.

To encrypt network traffic.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which TCP flag is used to initiate a connection between two hosts as part of the three-way handshake?

ACK

FIN

RST

SYN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the TCP communication process, what is the purpose of the RST flag?

To acknowledge the receipt of a packet.

To initiate a new connection.

To reset or terminate a connection abruptly.

To indicate the end of data transmission.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the correct sequence of packets in a successful TCP three-way handshake?

SYN -> ACK -> SYN-ACK

SYN -> SYN-ACK -> ACK

FIN -> FIN-ACK -> ACK

SYN -> RST -> ACK

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attackers use packet crafting tools like Colasoft Packet Builder to create fragmented packets for what primary purpose?

To increase the speed of the network.

To create backups of network configurations.

To bypass firewalls and Intrusion Detection Systems (IDS).

To test the physical network cabling.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are traditional network scanning techniques considered computationally less feasible on IPv6 networks?

IPv6 packets cannot be fragmented.

All IPv6 traffic is encrypted by default.

The vastly larger address space (2^64 hosts per subnet) makes brute-force scanning impractical.

Most scanning tools do not support the IPv6 header format.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which popular command-line tool is used for network discovery and security auditing, with capabilities for host discovery, port scanning, and OS detection?

Wireshark

Nmap

Netcat

Hping3

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?