Exam 5: Port Scanning
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
The ____ relies on the OS of the attacked computer, so it's a little more risky to use than the SYN scan.
(Multiple Choice)
4.9/5
(28)
Unicornscan optimizes ____ scanning beyond the capabilities of any other port scanner.
(Multiple Choice)
4.9/5
(43)
MATCHING
Match each term with the correct statement below.
-typically used to get past a firewall
(Multiple Choice)
4.9/5
(33)
The ____ option of Nmap is used to perform a TCP SYN stealth port scan.
(Multiple Choice)
4.7/5
(39)
A computer that receives a SYN packet from a remote computer responds to the packet with a(n) ____ packet if its port is open.
(Multiple Choice)
4.9/5
(38)
In any *NIX system, after saving a script, you need to make it executable so that you can run it. From the command line, type ____.
(Multiple Choice)
5.0/5
(33)
If subnetting is used in an organization, you can include the broadcast address by mistake when performing ping sweeps. How might this happen?
(Essay)
4.9/5
(31)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)