
Practical Cyber Hacking Skills for Beginners - Host Discovery Controls
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of packet does Nmap use to send a 'ping' to a target machine?
TCP ACK packet
ICMP timestamp request
ICMP echo request
TCP SYN packet
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Nmap probe asks the target machine for the current time?
TCP ACK packet
ICMP echo request
TCP SYN packet
ICMP timestamp request
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the main challenges of using the default Nmap scan?
It can be detected by intrusion systems.
It is too slow.
It only works on local networks.
It does not provide enough information.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What information does Nmap try to acquire by default during a scan?
Only active hosts
Only open ports
Only IP addresses
IP addresses, active hosts, and open ports
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of the 'list scan' in Nmap?
To perform a full network scan
To test firewall strength
To identify available IP addresses
To find open ports on a target
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key feature of the 'list scan'?
It is the fastest scan.
It is the most intrusive scan.
It does not alert firewalls.
It checks for open ports.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does the 'disable port scan' differ from the 'list scan'?
It runs faster.
It identifies active machines.
It is less intrusive.
It checks for open ports.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?