Correct Answer: NULL scan
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Ethical Hacking Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Ethical Hacking MCQ Questions
Which of the following options is a Linux/Unix sniffing tool that is designed for graphically displaying a system's incoming and outgoing connections?
In relation to Buffer overflows, which of the following canaries does not exist?
This attack queues up the packets that have bad source IP; uses memory and resources; and eventually hangs, reboots or crashes the system
Which is effects Of a DOS attack? i)Resource unavailability. ii)lncreased spam e-mail. iii)lncreased ads and pop-ups.
During which ofthe following attacks, an attacker has the plaintext and ciphertext of one or more messages and this information is used for determining the key in use?
While using the BackTrack tool with Linux, which of the following commands can be used for creating a directory named Example?
ARP poisoning can be prevented by enabling which of the following options on Cisco switches?
Which of the following is the correct syntax of the command that can be used for performing a sneaky scan and for analyzing its behavior in Wireshark?
Which of the following is a DOS-based wardialing program, which uses a modem for dialing ranges of numbers in search of a carrier frequency from a modem/ fax?
Which of the following network scanning processes involves the use of an Internet Control Message Protocol (ICMP) message?
Ethical Hacking MCQs | Topic-wise