Exam 5: Port Scanning
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
If an attacker decides to implement a less obvious port-scan,or stealth attack,which of the following techniques would be appropriate to make their activities more difficult to detect?
(Multiple Choice)
4.9/5
(33)
Closed ports respond to a NULL scan with what type of packet?
(Multiple Choice)
4.7/5
(37)
Nmap has a GUI front end that makes it easier to work with some of the complex options by providing a GUI.Which of the following is the Nmap GUI front end?
(Multiple Choice)
4.8/5
(31)
What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?
(Multiple Choice)
4.8/5
(33)
When writing a script which statement allows you to avoid creating an endless loop in your script?
(Multiple Choice)
4.7/5
(40)
An open port allows access to specific applications and cannot be vulnerable to attack.
(True/False)
4.8/5
(35)
When a TCP three-way handshake ends,both parties send what type of packet to end the connection?
(Multiple Choice)
4.8/5
(43)
When using the text editor vim what command appends text after the insertion point?
(Multiple Choice)
4.8/5
(48)
In a Linux script,which of the lines is important because it identifies the file as a script?
(Multiple Choice)
4.9/5
(41)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)