Scanning Practice

Map attack surface, discover live hosts, and identify open ports and services safely and efficiently.

1. Question

Which Nmap scan type is generally the FASTEST and LEAST likely to be logged by default on many systems?

2. Question

You need to identify the operating system of a remote host. Which Nmap option is MOST appropriate?

3. Question

Which of the following best describes a risk of overly aggressive scanning in a production environment?

4. Question

Which port and protocol combination is MOST likely associated with HTTPS during scanning?

5. Question

Which Nmap option is BEST suited to identify versions of services running on open ports?

6. Question

When a port is reported as 'filtered' during a scan, what does this MOST likely indicate?

7. Question

Why might you perform a host discovery scan (e.g., Nmap -sn) BEFORE running detailed port scans?

8. Question

UDP scanning is often slower and less reliable than TCP scanning because:

9. Question

You want to minimize impact while still getting useful data in a sensitive environment. Which approach is MOST appropriate?

10. Question

In the context of scanning, why is it helpful to correlate scan results with information from documentation or CMDBs?

Score: 0.0 / 10 (0 of 10 correct)