Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

1. SR In response to "nmap -n -sn localhost": What kind of information did the nmap scan results show you, specifically?

2. FIB What does the "-sn" option do in nmap? ping scan -disable port scan

3. SR How does the "-sn" option differ in packets send by a root user when used on a local ethernet network vs a remote network? A small amount of research is required for this question.

4. SR What are the differences between the "nmap -n " and "nmap -n -sn scans"?

5. SR What is different with the "nmap -n -p 1-65535 localhost" command?

6. SR Explain the differences between the "nmap -n " and "nmap -n -sS scans".

7. ESS Explain the differences between the "nmap -n -O " and "nmap -n -A
scans"?

8. MAT Match the nmap scan command to nap technique or action? -sS ,
-sT , -sA, -sW, -sM, -sU, -sN, -sF, -sX, -sI , -sY
, -sZ, -sO , -b

9. MAT Match nmap random options -O , -sC, -F, -r , -sV Scan ports consecutively , --top-ports, scan most common ports,
--port-ratio, Scan ports more common than ratio, Probe open ports

10. MAT Match the nmap host discovery options -sL List -sn Ping -Pn Skip host discovery -PS

TCP SYN -PA ACK -PU UDP -PY SCTP discovery -PE ICMP echo -PP timestamp -PM netmask request -PO IP Protocol Ping -n Never do DNS resolve -R Always do DNS resolve --system-dns

Use OS DNS resolver -traceroute Trace hop path to each host

11. MAT Match the nmap output options -oS Script kiddie-oG grepable --flist Print host interfaces and routes -oN normal -oX XML -oA All three major formats -d Decrease debugging level - open Show only open ports -v Increase verbosity

12. ESS What exactly is an nmap -sT scan? Explain & contrast to -sS in some detail.

13. ESS What is a SYN Stealth scan? Explain in some detail.

14. ESS Describe what a Bounce scan consists of, specifically.

15. ESS What does the "Use Decoy(s)" option do, exactly?

16. ESS Explain with some detail how NMap interprets & achieves O/S fingerprinting?

17. ESS Scan an open port on your target using a TCP Connect scan. Paste the scan results.

18. ESS Scan an open port on your target using a TCP FIN stealth scan. Paste the scan results.

19. ESS Scan an open port on your target using a TCP XMAS scan. Paste the scan results.

20. ESS Scan an open port on your target using a TCP Null scan. Paste the scan results.

21. ESS Scan a closed port on your target using a TCP Connect scan. Paste the scan results.

22. ESS Scan a closed port on your target using a TCP FIN stealth scan. Paste the scan results.

23. ESS Describe the packets sent to the target and received from the target on the closed port scan? Not a firewalled port

24. ESS Scan an open UDP port. Paste the scan results.

25. ESS Scan a closed UDP port. Paste the scan results.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93110108
  • Price:- $75

Guranteed 36 Hours Delivery, In Price:- $75

Have any Question?


Related Questions in Computer Network & Security

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: What is the network mask used by the router? (in dotted decim ...

1 these assignments need to be properly supported with

1. These assignments need to be properly supported with references to the scientific literature. 2. Use a 12pt font for the body of your assignment. 3. The assignment many be up to four (4) pages long, including any appe ...

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

Describe 2 variables a government will look at to predict

Describe 2 variables a government will look at to predict where the economy will be in the next six months.

Assignment- javafx and model-view separationyou are to

Assignment- JavaFX and Model-View separation You are to implement a JavaFX project that separates its model (application data and logic) from its view and controller (the JavaFX controls and event handlers that create th ...

Topic is impacts of data breaches the report will divide in

Topic is "Impacts of data breaches". the report will divide in to 5 section which is : "" 1-Abstract: comprehensive overview of the report in 150 to 200 words. 2- Introduction: Describe the topic and its issue in 250 to ...

What comparison of means test was used to answer the

What comparison of means test was used to answer the question I need it now is there a relationship between parents highest level of education and socioeconomic status\need the entire script

Cybersecurity policy design issues describe cybersecurity

Cybersecurity Policy Design Issues Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication What features can be added ...

Question in regards to encryption does the public key and

Question : In regards to encryption, does the public key and private key come from the sender or does the receiver already have the private and is given the public key by the sender? The response must be typed, single sp ...

Question suppose you work in a network security company and

Question: Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As