Search Header Logo
Practical Cyber Hacking Skills for Beginners - Host Discovery Controls - Part 2

Practical Cyber Hacking Skills for Beginners - Host Discovery Controls - Part 2

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

The video tutorial covers various network scanning techniques using nmap, focusing on overcoming firewall restrictions. It explains the use of TCP SYN and ACK pings, port targeting, and verbosity levels to gather more information about network hosts. The tutorial also introduces random target scanning for broader network analysis.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential issue with traditional ping scans?

They are not compatible with Nmap.

They can be blocked by firewalls.

They provide too much information.

They are too fast.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of using the minus PS option in Nmap?

To increase verbosity.

To skip host discovery.

To conduct a TCP SYN ping.

To perform a full port scan.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does Nmap determine if a host is active using TCP SYN ping?

By using ICMP echo requests.

By sending a full data packet.

By sending an empty TCP packet with the SYN flag.

By completing the three-way handshake.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does increasing the verbosity level in Nmap do?

It changes the scan type.

It skips closed ports.

It reduces the scan time.

It provides more detailed information.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default verbosity level in Nmap?

Level 4

Level -4

Level 0

Level 1

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the TCP ACK ping differ from the TCP SYN ping?

It sends a SYN packet first.

It uses ICMP requests.

It requires a full handshake.

It sends an ACK packet directly.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might firewalls struggle to detect TCP ACK pings?

They do not use SYN flags.

They mimic normal traffic.

They use encrypted packets.

They are too fast.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?