0% found this document useful (0 votes)
22 views

Unit 3 2 marks

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Unit 3 2 marks

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Cyber Security - Unit-III 2 mark

1.What is meant by Reconnaisance?


Reconnaissance, often referred to as 'cyber reconnaissance' or 'cyber intelligence gathering', is the
process of collecting information about potential targets, vulnerabilities, and attack vectors.

2.Define Port Scanning.


A port scan is a common technique hackers use to discover open doors or weak points in
a network. A port scan attack helps cyber criminals find open ports and figure out whether they
are receiving or sending data.

3.Define Netwotk Scanning.


Network scanning is a process used to identify active devices (hosts), services running on
them, and other details about the system and network. It involves probing a network or a system
with packets (messages sent over a network to check its status) to gather useful information.

4. Define Vulnerability Scanning.


Vulnerability scanning is the process of discovering, analyzing, and reporting on security
flaws and vulnerabilities. Vulnerability scans are conducted via automated vulnerability scanning
tools to identify potential risk exposures and attack vectors across an organization’s networks,
hardware, software, and systems.

5.What are the scanning methodologies available?


Ping Sweer Techniques
NMAP

6.What is NMAP?
NMAP purpose is to explore networks and perform security audits. With Nmap, users
can easily discover hosts and services on a computer network, detect operating systems, identify
open ports, and collect information about different network devices.

7.Define Banner Grabbing.


Banner grabbing is a method used to obtain information about computer systems and
services on open ports, providing details such as software type and version.

8.Define OS finger printing Techniques.


OS fingerprinting is the process a hacker goes through to determine the type of operating
system.

You might also like