Work Ethics and Ethical Hacking Quiz - Answer
Work Ethics and Ethical Hacking Quiz - Answer
Q1 15 Marks
1. Mention the types of Scanning.
Port Scanning.
Network Scanning
Vulnerability Scanning:
3. What is the difference between the two commands (ping & ping swap)?
Ping: Sends an ICMP echo request to a single target IP address to check if it is alive.
Ping Swap: Sends ICMP echo requests to multiple IP addresses in a range simultaneously to
discover live hosts in a network.
4. What is the benefit of this command? Support your answer from the figure below.
Does this command work in the LAN or WAN?
The arping command is used to send ARP (Address Resolution Protocol) requests to a specific IP address to discover its MAC address.
It is useful for identifying devices within a Local Area Network (LAN) and verifying their presence.
The output shows that the device with IP 192.168.16.70 is active and responding to ARP requests.
This command works in a LAN (Local Area Network) because ARP is used to resolve IP addresses to MAC addresses within the same network segment.
Name:
5. Briefly explain how to establish the TCP connection (3-way handshaking). Mention
the TCP connection flags.
SYN: The client sends a SYN (Synchronize) packet to the server to initiate a connection.
SYN-ACK: The server responds with a SYN-ACK (Synchronize-Acknowledge) packet to acknowledge the client's request.
ACK: The client sends an ACK (Acknowledge) packet to confirm the connection.
6. What is the benefit of this command? Support your answer from the figure below.
Mention the disadvantage of this method.
Benefits of the Command: Discovery of Open Ports, Quick Results, Service Detection
The scan can be detected by intrusion detection systems (IDS) or firewalls, as it sends multiple packets to the target.
open close
open close