Scanning Networks
SKILLSET
Sending data across networking infrastructure in order to acquire systematic information.
Related Questions
- Which of following methods could a hacker use to evade an intrusion detection system? (choose three)
- The Idle Scan sends out _____ to a computer to find out what TCP ports are open.
- When scanning hosts that are protected by the firewall that blocks ping probes, you would use:
- A pentester is attempting to ping a target that exists but receives no responses or a response that states the destination is unreachable. ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?
- How would you send a packet with a bad checksum using Nmap?
- Imagine there are two servers in a data center. If one server had more open ports than the other server in all cases the server that has the most open ports is always the most vulnerable to an attack.
- Which type of firewall evasion procedure involves splitting packets into smaller chunks?
- To perform a scan in nmap waiting five minutes between sending each probe, you would use the:
- Network analyzers provide significant information inside and outside of the firewall. A large amount of inbound traffic from unknown hosts could be an indication of which of the following?
- Which of these is not a valid nmap scan type: