Reconnaissance Fundamentals
SKILLSET
Reconnaissance Fundamentals
Related Questions
- The primary method for detecting port scans against your network is to utilize a host-based IDS. True or false?
- Which of these flags would be set if you perform a XMAS tree scan on the target:
- Consider the case where the firewall is checking the size of the packet. In this case, the firewall drops all Nmap scan packets of length '58 bytes. Which of these Nmap switches would help us evade the firewall?
- Which of these scans is the tool IPEye capable of performing?
- Which of the following scanning techniques are used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic?
- Which of the following port states and responses is correct for a NULL scan or FIN scan against a target computer?
- Your company has 5 different subnets. 192.168.1.0,192.168.2.0,192.168.3.0,192.168.4.0 and 192.168.5.0. How can NMAP be used to scan these "Class C" networks in one command?
- Which of these is the command line syntax for nmap?
- Which type of firewall evasion procedure involves splitting packets into smaller chunks?
- True or false, when performing a null scan if no response comes it means the port is open; if the port is closed, the scan will return an RST flag.