This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Chapter 3: Scanning Tools
1. Can you use a scanner to check open ports on a computer on another LAN?
2. What are the various phases of penetration testing that make use of scanning tools?
3. What is the difference between a ping scan and a Ping of Death?
4. What useful information comes from port scans?
5. Can you stop a port scan if you discover you are being scanned?
6. Describe factors to consider when selecting a scanning tool that is most appropriate for a
particular task.
7. In the NmapFE program, where do you set the spoofed IP you will use as the from field on the
ping packets you send?
8. Can Cheops be used to scan the entire Internet?
Some “security experts” used to scan various companies' networks and then send them e-mails
informing them of their shortcomings and offering to fix these for a fee. Is this a reasonable and
ethical marketing technique?
Does it make us safer to legislate port scans as illegal?
9. Is the Strobe scanner under development currently?
10. Can you use Strobe on a Windows machine?
Match each term with the correct statement below.
a. -sT d. -sU
b. -sP e. -sO
c. -sS
11. ______ nmap option that performs TCP connect scanning
12. ______ nmap option that performs half-open scanning
13. ______ nmap option that performs UDP scanning
14. ______ nmap option that performs IP protocol scanning
15. ______ nmap option that performs ping scanning
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.