Scanning Practice
Map attack surface, discover live hosts, and identify open ports and services safely and efficiently.
1. Question
Which Nmap scan type is generally the FASTEST and LEAST likely to be logged by default on many systems?
2. Question
You need to identify the operating system of a remote host. Which Nmap option is MOST appropriate?
3. Question
Which of the following best describes a risk of overly aggressive scanning in a production environment?
4. Question
Which port and protocol combination is MOST likely associated with HTTPS during scanning?
5. Question
Which Nmap option is BEST suited to identify versions of services running on open ports?
6. Question
When a port is reported as 'filtered' during a scan, what does this MOST likely indicate?
7. Question
Why might you perform a host discovery scan (e.g., Nmap -sn) BEFORE running detailed port scans?
8. Question
UDP scanning is often slower and less reliable than TCP scanning because:
9. Question
You want to minimize impact while still getting useful data in a sensitive environment. Which approach is MOST appropriate?
10. Question
In the context of scanning, why is it helpful to correlate scan results with information from documentation or CMDBs?