Scanning Networks
SKILLSET
Sending data across networking infrastructure in order to acquire systematic information.
Related Questions
- Which of the following port states and responses is correct for a NULL scan or FIN scan against a target computer?
- Metasploit has a module that can help you discover idle hosts on a network. These hosts can then be used for idle zombie scans in order to evade the firewall. This module is:
- Unless the IDS can tell which _____ a packet is destined for, it may be bypassed, since the overlapping fragments in the packets may be reassembled incorrectly,
- Which of these port status types would be used to indicate that ports are accessible by nmap but it is not possible to determine if they're open or closed?
- Which of these would come first in the scanning process?
- When scanning hosts that are protected by the firewall that blocks ping probes, you would use:
- During a TCP connect scan, if an RST is received from the target, then the port is:
- To perform an IP ping in nmap, you would use:
- Which of these choices is the GUI version of nmap?
- Which terminology is used to describe spoofed packets from other hosts which make it difficult for network administrators to determine which host the scan came from?