Practical Cyber Hacking Skills for Beginners - Host Discovery Controls - Part 2

Practical Cyber Hacking Skills for Beginners - Host Discovery Controls - Part 2

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial covers various network scanning techniques using nmap, focusing on overcoming firewall restrictions. It explains the use of TCP SYN and ACK pings, port targeting, and verbosity levels to gather more information about network hosts. The tutorial also introduces random target scanning for broader network analysis.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential issue with traditional ping scans?

They are not compatible with Nmap.

They can be blocked by firewalls.

They provide too much information.

They are too fast.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of using the minus PS option in Nmap?

To increase verbosity.

To skip host discovery.

To conduct a TCP SYN ping.

To perform a full port scan.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does Nmap determine if a host is active using TCP SYN ping?

By using ICMP echo requests.

By sending a full data packet.

By sending an empty TCP packet with the SYN flag.

By completing the three-way handshake.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does increasing the verbosity level in Nmap do?

It changes the scan type.

It skips closed ports.

It reduces the scan time.

It provides more detailed information.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default verbosity level in Nmap?

Level 4

Level -4

Level 0

Level 1

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the TCP ACK ping differ from the TCP SYN ping?

It sends a SYN packet first.

It uses ICMP requests.

It requires a full handshake.

It sends an ACK packet directly.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might firewalls struggle to detect TCP ACK pings?

They do not use SYN flags.

They mimic normal traffic.

They use encrypted packets.

They are too fast.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?