#1
What is the primary goal of network scanning?
To identify and locate vulnerabilities in a network
ExplanationNetwork scanning aims to find vulnerabilities within a network for proactive security measures.
#2
What is the purpose of ARP (Address Resolution Protocol) in networking?
To resolve IP addresses to MAC addresses
ExplanationARP is utilized in networking to resolve IP addresses to MAC addresses, facilitating communication between devices.
#3
What is the concept of 'packet sniffing' in network security?
Capturing and analyzing network traffic
ExplanationPacket sniffing involves capturing and analyzing network traffic for various purposes, including troubleshooting and security analysis.
#4
Which network scanning technique aims to identify live hosts within a network?
Ping Sweeps
ExplanationPing Sweeps are a network scanning technique used to identify live hosts within a network by sending ICMP echo requests and analyzing responses.
#5
In the context of network scanning, what is a 'false positive'?
An incorrect identification of a vulnerability that doesn't exist
ExplanationA 'false positive' in network scanning refers to the incorrect identification of a vulnerability that does not actually exist, leading to potential misinformation.
#6
Which of the following is a passive network scanning technique?
Packet Sniffing
ExplanationPacket Sniffing is a passive technique involving the capture and analysis of network traffic to gather information without actively interacting with the target.
#7
What is the purpose of a firewall in network security?
To block unauthorized access and control incoming/outgoing network traffic
ExplanationFirewalls serve as a protective barrier by preventing unauthorized access and managing network traffic for enhanced security.
#8
Which protocol is commonly used for network mapping and discovery?
SNMP
ExplanationSNMP (Simple Network Management Protocol) is frequently used for network mapping and discovery, facilitating communication and information retrieval from network devices.
#9
What is the purpose of a honeypot in network security?
To attract and detect malicious activity
ExplanationHoneypots are deployed to attract and identify malicious activities by mimicking vulnerable systems.
#10
What is the difference between a vulnerability scan and a penetration test?
A vulnerability scan identifies weaknesses, while a penetration test exploits them
ExplanationVulnerability scans aim to identify weaknesses, while penetration tests go further by actively exploiting vulnerabilities to assess the system's resilience.
#11
What is the purpose of traceroute in network analysis?
To map the route that packets take through a network
ExplanationTraceroute is used to map the route packets take through a network, aiding in network analysis and troubleshooting.
#12
Which tool is commonly used for host analysis and enumeration in a network?
Nmap
ExplanationNmap is a widely used tool for network mapping and enumeration, helping analyze hosts and their services.
#13
What is banner grabbing in the context of network security?
Obtaining information about a service/version running on a remote system
ExplanationBanner grabbing involves extracting details about the service/version running on a remote system for vulnerability assessment.
#14
In the context of network scanning, what does the term 'OS fingerprinting' refer to?
Identifying the operating system of a target system
ExplanationOS fingerprinting involves determining the operating system of a target system, aiding in vulnerability assessment and attack planning.
#15
Which of the following is a vulnerability scanning tool?
Nessus
ExplanationNessus is a popular vulnerability scanning tool used to identify and assess security vulnerabilities in a network.
#16
Which type of scan sends a reset packet to the target system to determine if a port is open?
RST Scan
ExplanationRST Scan involves sending reset packets to determine the status of ports on a target system, providing information about open or closed ports.
#17
What is the purpose of the Common Vulnerabilities and Exposures (CVE) system?
To standardize the names of vulnerabilities
ExplanationThe CVE system standardizes the naming of vulnerabilities, simplifying communication and understanding of security issues across the industry.