
Practical Cyber Hacking Skills for Beginners - Firewall and IDS Evasion Techniques
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why does Nmap have a variety of options for scanning?
To evade detection by firewalls and IDS
To reduce network traffic
To enhance scanning speed
To increase the number of scanned ports
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of using the -F option in Nmap?
To use a specific port
To scan faster
To fragment packets
To increase packet size
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you specify custom packet sizes in Nmap?
Using -G
Using -D
Using --mtu
Using -F
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main advantage of using decoys in Nmap scans?
To increase packet size
To speed up the scan
To make the scan appear to come from multiple IPs
To reduce scan accuracy
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What must be true about decoy IP addresses for them to be effective?
They must be inactive
They must be live and active
They must be from a different network
They must be from the same subnet
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which port number is commonly trusted by firewalls and can be used for spoofing?
Port 443
Port 22
Port 53
Port 80
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of using the -G option in Nmap?
To fragment packets
To set a custom packet size
To specify a decoy
To specify a port number
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?