Practical Cyber Hacking Skills for Beginners - Host Discovery Controls

Practical Cyber Hacking Skills for Beginners - Host Discovery Controls

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial explains how Nmap uses different probes to discover active hosts on a network. It covers the four main types of packets used by Nmap: ICMP echo request, TCP SYN, TCP ACK, and ICMP timestamp request. The tutorial also discusses host discovery controls and the default information Nmap seeks, such as IP addresses and open ports. It highlights the challenges of intrusive scans and introduces stealth scanning techniques like the least scan and disable port scan. Finally, it explains the disable ping scan, which skips host discovery to directly scan ports, useful for network administrators testing security systems.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of packet does Nmap use to send a 'ping' to a target machine?

TCP ACK packet

ICMP timestamp request

ICMP echo request

TCP SYN packet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Nmap probe asks the target machine for the current time?

TCP ACK packet

ICMP echo request

TCP SYN packet

ICMP timestamp request

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the main challenges of using the default Nmap scan?

It can be detected by intrusion systems.

It is too slow.

It only works on local networks.

It does not provide enough information.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What information does Nmap try to acquire by default during a scan?

Only active hosts

Only open ports

Only IP addresses

IP addresses, active hosts, and open ports

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of the 'list scan' in Nmap?

To perform a full network scan

To test firewall strength

To identify available IP addresses

To find open ports on a target

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key feature of the 'list scan'?

It is the fastest scan.

It is the most intrusive scan.

It does not alert firewalls.

It checks for open ports.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the 'disable port scan' differ from the 'list scan'?

It runs faster.

It identifies active machines.

It is less intrusive.

It checks for open ports.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?