in Education by
A _____________ is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts. (a) ping-based hacking (b) ping sweep (c) ping-range (d) pinging I had been asked this question in a national level competition. The doubt is from Fingerprinting in portion Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct answer is (b) ping sweep For explanation: A ping sweep is a network scanning practice through which hackers can use to conclude to a point which IP address from a list of IP addresses is mapping to live hosts.

Related questions

0 votes
0 votes
0 votes
    ____________ scanning is a procedure to identify active hosts on your network. (a) Network (b) Port (c) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In port scanning, a _________ is always associated with an IP address (usually of the host system) & the ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
0 votes
    _____________ is a popular IP address and port scanner. (a) Cain and Abel (b) Snort (c) Angry IP Scanner (d ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    You can attain a series of IP addresses allotted to a particular company using __________ site. (a) https://www. ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Using email hacking illicit hackers can send & spread ___________ virus _____________ and spam emails. (a) ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Even our emails contain the IP address of the sender which helps in the enumeration. We can get this IP from ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    _____________ is data interception method used by hackers. (a) Phishing (b) DoS (c) Sniffing (d) MiTM ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    If any given address is running live, it will return an ICMP ECHO reply. (a) True (b) False I got ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
...