Which of the following is the syntax of ping sweep using Nmap for ICMP scanning?
nmap —sP -PE
nmap —sP —PE —PA
nmap —sP —PA —PE
Correct Answer:
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Ethical Hacking Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Ethical Hacking MCQ Questions
In relation to ethical hacking. which of the following options refers to a method. which is used for determining the type of operating system running on a remote computer?
In relation to switched network sniffing, which of the following options is represented by a switchport?
attack sends a combination of malformed IP packets to the victim system and causes the system to crash. The malformed packets consist of invalid/unexpected fragmentation. TCP segments, protocol, header values, packet size. offsets. routing flags. etc.
Which of the following commands can be used for creating a firewall rule in iptable, which will result the blocking of ICMP ECHO requests from the outside sources and will disable ping sweeps on a network?
Which of the following keyboard shortcuts stops working during a Trojan infection?
Hackers use __________ to execute arbitrary scripts through the web browser.
Hackers can gain access to computer systems through the use of ____.
What are the features of worms?
Which of the following programming languages are commonly associated with Buffer overflows?
In relation to Wireshark filters, which of the following operators is/are equivalent to the equal function?