Exam 5: Port Scanning

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ relies on the OS of the attacked computer, so it's a little more risky to use than the SYN scan.

(Multiple Choice)
4.9/5
(28)

Unicornscan optimizes ____ scanning beyond the capabilities of any other port scanner.

(Multiple Choice)
4.9/5
(43)

MATCHING Match each term with the correct statement below. -typically used to get past a firewall

(Multiple Choice)
4.9/5
(33)

Why is port scanning useful for hackers?

(Essay)
4.9/5
(36)

A closed port can be vulnerable to an attack.

(True/False)
4.9/5
(39)

The ____ option of Nmap is used to perform a TCP SYN stealth port scan.

(Multiple Choice)
4.7/5
(39)

____ is a protocol packet analyzer.

(Multiple Choice)
4.7/5
(43)

A computer that receives a SYN packet from a remote computer responds to the packet with a(n) ____ packet if its port is open.

(Multiple Choice)
4.9/5
(38)

In any *NIX system, after saving a script, you need to make it executable so that you can run it. From the command line, type ____.

(Multiple Choice)
5.0/5
(33)

If subnetting is used in an organization, you can include the broadcast address by mistake when performing ping sweeps. How might this happen?

(Essay)
4.9/5
(31)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)