Networking Chapter 3 Scanning Tools Can You Use Scanner Check Open Ports Computer Another

subject Type Homework Help
subject Pages 2
subject Words 368
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 3: Scanning Tools
1. Can you use a scanner to check open ports on a computer on another LAN?
2. What are the various phases of penetration testing that make use of scanning tools?
3. What is the difference between a ping scan and a Ping of Death?
4. What useful information comes from port scans?
5. Can you stop a port scan if you discover you are being scanned?
6. Describe factors to consider when selecting a scanning tool that is most appropriate for a
particular task.
7. In the NmapFE program, where do you set the spoofed IP you will use as the from field on the
ping packets you send?
8. Can Cheops be used to scan the entire Internet?
Some “security experts” used to scan various companies' networks and then send them e-mails
informing them of their shortcomings and offering to fix these for a fee. Is this a reasonable and
ethical marketing technique?
page-pf2
Does it make us safer to legislate port scans as illegal?
9. Is the Strobe scanner under development currently?
10. Can you use Strobe on a Windows machine?
Match each term with the correct statement below.
a. -sT d. -sU
b. -sP e. -sO
c. -sS
11. ______ nmap option that performs TCP connect scanning
12. ______ nmap option that performs half-open scanning
13. ______ nmap option that performs UDP scanning
14. ______ nmap option that performs IP protocol scanning
15. ______ nmap option that performs ping scanning

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.