Which of the following is NOT an output of the nmap scanning?
Question 18
18.
While performing a port scan, under what conditions would one prefer to use a UDP scan over a TCP scan. Why?
Question 19
19.
Given nmap -sT, if a port is open it will respond with
Question 20
20.
State True or False.
nmap scan packets for OS detection will get same response irrespective of the operating system of the scanned device.
Question 21
21.
State True or False.
nmap and nslookup ARE hacking tools.
Question 22
22.
State True or False.
A MAC address refers to the physical address of a device and it is usually not easy to change it.
Question 23
23.
State True or False.
In order to access a device it is sufficient to know its IP address or the MAC address. It is not required to have both pieces of information.
Question 24
24.
To go from slash format notation to dotted decimal notation you simply convert the bits in each octet to their decimal number. Having said that what will be represented by /26
Question 25
25.
Recon is ___________ when the attacker is completely remote from any target device and the recon techniques don’t interact with that target.