Module 2 Scanning Networks Flashcards

(49 cards)

1
Q

What is network scanning?

A

The process of discovering live hosts, open ports, services, and vulnerabilities on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main goal of network scanning in CEH?

A

To gather detailed information about target systems for attack planning or security assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which phase of ethical hacking does network scanning belong to?

A

Scanning and Enumeration phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is host discovery?

A

The process of identifying live hosts on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is port scanning?

A

The technique used to identify open, closed, or filtered ports on a target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is service version detection?

A

Identifying the application and version running on an open port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is OS fingerprinting?

A

The technique used to determine the operating system of a target host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is vulnerability scanning?

A

The process of identifying known weaknesses in systems or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is TCP connect scan?

A

A full TCP handshake scan that completes the connection to the target port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is SYN scan?

A

A half-open scan that sends SYN packets without completing the TCP handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is SYN scan stealthier than TCP connect scan?

A

Because it does not complete the full TCP handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is UDP scanning?

A

The process of identifying open UDP ports on a target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is UDP scanning slower than TCP scanning?

A

Because UDP does not provide responses for closed ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is FIN scan?

A

A stealth scan that sends FIN packets to evade firewalls and logging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is NULL scan?

A

A scan that sends packets with no flags set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Xmas scan?

A

A scan that sends packets with FIN, PSH, and URG flags set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which RFC defines TCP/IP behavior used in stealth scans?

A

RFC 793.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does an open port indicate?

A

A service is actively listening on the port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does a filtered port indicate?

A

A firewall or security device is blocking the port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What tool is most commonly used for network scanning in CEH?

21
Q

What does Nmap stand for?

A

Network Mapper.

22
Q

Which Nmap option is used for SYN scan?

23
Q

Which Nmap option is used for OS detection?

24
Q

Which Nmap option enables service version detection?

25
Which Nmap option scans all 65535 ports?
-p-
26
What Nmap option performs aggressive scanning?
-A
27
What is Nmap scripting engine (NSE)?
A framework that allows execution of scripts for advanced scanning tasks.
28
What is banner grabbing?
The process of retrieving service information from open ports.
29
Which protocol is commonly used for banner grabbing?
TCP.
30
What tool besides Nmap can perform banner grabbing?
Netcat.
31
What is Netcat used for in scanning?
Reading and writing data across network connections.
32
What is Hping?
A packet crafting and analysis tool used for firewall testing and scanning.
33
What is ICMP echo request used for?
Checking whether a host is alive.
34
What is an ICMP sweep?
Scanning multiple hosts to identify live systems.
35
Why might ICMP be blocked?
To prevent network reconnaissance and DoS attacks.
36
What is firewall evasion?
Techniques used to bypass firewalls during scanning.
37
Name one firewall evasion technique.
Fragmentation of packets.
38
What is packet fragmentation?
Splitting packets into smaller pieces to bypass filtering rules.
39
What is decoy scanning?
Using fake source IPs to hide the real scanner.
40
Which Nmap option enables decoy scanning?
-D
41
What is source port manipulation?
Changing the source port to bypass firewall rules.
42
Which Nmap option sets a specific source port?
--source-port
43
What is IDS evasion?
Techniques used to avoid detection by intrusion detection systems.
44
Why is timing important in scanning?
Slow scans reduce the chance of detection.
45
Which Nmap option controls scan timing?
-T
46
What is a vulnerability scanner example used after scanning?
Nessus.
47
What is the risk of aggressive scanning?
It can be detected and disrupt target systems.
48
What is a legal requirement before scanning?
Written authorization from the system owner.
49
Why is network scanning critical for defenders?
It helps identify exposed services and misconfigurations.