Multiple Choice
Karen was running port scans on each machine of her network in order to identify suspicious ports on the target machines. She observed the following results during the port scan of a particular machine.
A) Some of the ports were not being acknowledged, i.e. no acknowledgment from the target machine II. Some ports were responding with SYN + ACK packets III. Some ports were responding with an RST packet What should she interpret for the ports that did not return the acknowledgement?
B) She should that those ports as Closed ports
C) She should that those ports as Open ports
D) She should that those ports as Stealth ports
E) She should that those ports as Half Open ports
Correct Answer:

Verified
Correct Answer:
Verified
Q1: An IT security engineer notices that the
Q2: A company identified critical vulnerability in its
Q4: A hacker, who posed as a heating
Q5: ABC bank, a UK-based bank hired Anthony,
Q6: Jackson, a social media editor for Early
Q7: An organization has deployed a web application
Q8: A common cryptographical tool is the use
Q9: Which of the following conditions must be
Q10: When comparing the testing methodologies of Open
Q11: Which of the following tools would be