Network Scanning Quiz

Network Scanning Quiz

University

44 Qs

quiz-placeholder

Similar activities

BASIS DATA XI 25

BASIS DATA XI 25

11th Grade - University

40 Qs

Recap Topik 1 Cloud

Recap Topik 1 Cloud

University

45 Qs

UAS Pengantar Teknologi Informasi

UAS Pengantar Teknologi Informasi

University

41 Qs

Grade 11 Week 2 Quiz

Grade 11 Week 2 Quiz

11th Grade - University

40 Qs

7 CĐ 1 P1

7 CĐ 1 P1

7th Grade - University

45 Qs

BSOA 3rd Year Final Exam

BSOA 3rd Year Final Exam

University

40 Qs

IT infrastructure and Emerging Tech

IT infrastructure and Emerging Tech

University

43 Qs

Long Quiz # 2 SDL and Project Management

Long Quiz # 2 SDL and Project Management

University

40 Qs

Network Scanning Quiz

Network Scanning Quiz

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

Usman Ali

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the module objectives, what is the primary goal of network scanning?

To gain administrative access to a server.

To identify live hosts, open ports, and services on a network.

To launch a Denial-of-Service (DoS) attack.

To encrypt network traffic.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which TCP flag is used to initiate a connection between two hosts as part of the three-way handshake?

ACK

FIN

RST

SYN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the TCP communication process, what is the purpose of the RST flag?

To acknowledge the receipt of a packet.

To initiate a new connection.

To reset or terminate a connection abruptly.

To indicate the end of data transmission.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the correct sequence of packets in a successful TCP three-way handshake?

SYN -> ACK -> SYN-ACK

SYN -> SYN-ACK -> ACK

FIN -> FIN-ACK -> ACK

SYN -> RST -> ACK

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attackers use packet crafting tools like Colasoft Packet Builder to create fragmented packets for what primary purpose?

To increase the speed of the network.

To create backups of network configurations.

To bypass firewalls and Intrusion Detection Systems (IDS).

To test the physical network cabling.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are traditional network scanning techniques considered computationally less feasible on IPv6 networks?

IPv6 packets cannot be fragmented.

All IPv6 traffic is encrypted by default.

The vastly larger address space (2^64 hosts per subnet) makes brute-force scanning impractical.

Most scanning tools do not support the IPv6 header format.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which popular command-line tool is used for network discovery and security auditing, with capabilities for host discovery, port scanning, and OS detection?

Wireshark

Nmap

Netcat

Hping3

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?