Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Vulnerability Management Exam 2026 with precise detailed solutions

Beoordeling
-
Verkocht
-
Pagina's
36
Cijfer
A+
Geüpload op
04-04-2026
Geschreven in
2025/2026

Vulnerability Management Exam 2026 with precise detailed solutions

Instelling
Vulnerability Management
Vak
Vulnerability Management

Voorbeeld van de inhoud

2



Vulnerability Management Exam 2026 with precise || || || || || ||




detailed solutions ||




Enumeration Tools - ✔✔Used to identify and scan network ranges and hosts belonging to the || || || || || || || || || || || || || || ||




target and map out an attack surface.
|| || || || || || ||




This is performed to gather intelligence that can be turned into an attack strategy, or conversely,
|| || || || || || || || || || || || || || || ||




when used as a defensive tool, to reduce the attack surface and mitigate potential attack vectors.
|| || || || || || || || || || || || || || ||




Involve at least some sort of active connection to the target.
|| || || || || || || || || || ||




An active connection is one where the attacker transmits data to the target.
|| || || || || || || || || || || || ||




The attacker machine may make obvious TCP connections to a firewall, send repetitive DNS and
|| || || || || || || || || || || || || || ||




reverse DNS queries, or transmit phishing emails to targets within the network.
|| || || || || || || || || || || ||




Active techniques are those that will be discovered if the victim is logging or otherwise
|| || || || || || || || || || || || || || ||




monitoring network and host connections. || || || ||




Enumeration Tools: Open-source Intelligence (OSINT) - ✔✔These tools query publicly available || || || || || || || || || ||




information, mostly using web and social media search tools.
|| || || || || || || || || ||




This can be considered a fully passive approach.
|| || || || || || ||




Enumeration Tools: Footprinting - ✔✔These tools map out the layout of a network, typically in || || || || || || || || || || || || || || ||




terms of IP address usage, routing topology, and DNS namespace (subdomains and hostnames).
|| || || || || || || || || || || || ||




Can be performed in active, nonstealthy modes to obtain quick results at the risk of detection or
|| || || || || || || || || || || || || || || || ||




by using slow semi-passive and passive techniques.
|| || || || || ||

,2




Enumeration Tools: Fingerprinting - ✔✔These tools perform host system detection to map out || || || || || || || || || || || || ||




open ports, OS type and version, file shares, running services and applications, system uptime,
|| || || || || || || || || || || || || ||




and other useful metadata.
|| || || ||




Can be performed by active, semi-passive, and passive tools.
|| || || || || || || ||




Nmap Security Scanner - ✔✔Uses diverse methods of host discovery and fingerprinting.
|| || || || || || || || || || || ||




The tool is open-source software with packages for most versions of Windows, Linux, and
|| || || || || || || || || || || || || ||




macOS. ||




It can be run from the command line or via a GUI.
|| || || || || || || || || || ||




Nmap: List scan (-sL) - ✔✔This lists the IP addresses from the supplied target range(s) and
|| || || || || || || || || || || || || || || ||




performs a reverse-DNS query to discover any host names associated with those IPs.
|| || || || || || || || || || || || ||




This can be used to check that you have specified appropriate targets. No probes are directed at
|| || || || || || || || || || || || || || || || ||




the actual hosts.
|| ||




Nmap: TCP SYN ping (-PS <PortList>) - ✔✔To defeat a firewall, the attacker might want to
|| || || || || || || || || || || || || || || ||




probe ports other than the default HTTP/HTTPS ones.
|| || || || || || || ||




There are numerous other host detection techniques, including TCP ACK, UDP, SCTP INIT, and
|| || || || || || || || || || || || || ||




IP protocol ping.
|| ||




Nmap: Sparse scanning (--scan-delay <Time>) - ✔✔One of the principal means of making a scan
|| || || || || || || || || || || || || || ||




stealthy is to collect results over an extended period. || || || || || || || || ||

,2


You can set Nmap to issue probes with significant delays between each probe to try to defeat
|| || || || || || || || || || || || || || || || ||




intrusion detection systems. || || ||




Of course, this makes host discovery a lengthy process. You can also configure delays using a
|| || || || || || || || || || || || || || || ||




timing template (-Tn, where n is a number from 0 to 5, with 0 being slowest).
|| || || || || || || || || || || || || || || ||




Another IDS evasion technique is to scan the scope in a random order (--randomize-hosts).
|| || || || || || || || || || || || ||




Nmap: TCP Idle scanning (-sI) - ✔✔Another way to make a scan stealthy is to use a so-called
|| || || || || || || || || || || || || || || || || ||




"zombie" host to appear to start the scan, disguising the identity of the host used to launch the
|| || || || || || || || || || || || || || || || || ||




scan. ||




This type of scan takes much longer to complete than ordinary ping detection.
|| || || || || || || || || || || || ||




Another masking option is to use the -d switch to add a number of decoy source IP addresses.
|| || || || || || || || || || || || || || || || ||




Nmap: Fragmentation (-f or --mtu) - ✔✔This technique splits the TCP header of each probe
|| || || || || || || || || || || || || || ||




between multiple IP datagrams. || || || ||




The principle is that splitting the header will make it harder for intrusion detection software to
|| || || || || || || || || || || || || || || ||




analyze. ||




If the sensor attempts to reassemble the packets, that will consume more CPU cycles so that
|| || || || || || || || || || || || || || || ||




option is sometimes disabled to improve performance.
|| || || || || || ||




However, as security appliances become more powerful, fragmentation is less likely to succeed as
|| || || || || || || || || || || || ||




a tactic (and the IDS can be configured to look for unusual fragmentation patterns).
|| || || || || || || || || || || || || ||




Nmap Output: Interactive - ✔✔Human-readable output designed to be viewed on-screen.
|| || || || || || || || || ||

, 2


Nmap Output: Normal (-oN) - ✔✔Human-readable output directed to a file for analysis later.
|| || || || || || || || || || || || ||




Nmap Output: XML (-oX) - ✔✔Output using XML formatting to delimit the information.
|| || || || || || || || || || || ||




Nmap Output: Grepable output (-oG) - ✔✔This delimits the output using one line for each host
|| || || || || || || || || || || || || || || ||




and tab, slash, and comma characters for fields.
|| || || || || || || ||




This format makes it easier to parse the output using the grep Linux regular expressions command
|| || || || || || || || || || || || || || ||




(or any other regex tool).
|| || || || ||




Nmap Port Scan: TCP SYN (-sS) - ✔✔This is a fast technique also referred to as half-open
|| || || || || || || || || || || || || || || || ||




scanning as the scanning host requests a connection without acknowledging it.
|| || || || || || || || || || ||




The target's response to the scan's SYN packet identifies the port state.
|| || || || || || || || || || ||




Nmap Port Scan: TCP connect (-sT) - ✔✔A half-open scan requires Nmap to have privileged
|| || || || || || || || || || || || || || ||




access to the network driver so that it can craft packets.
|| || || || || || || || || || ||




If privileged access is not available, Nmap has to use the OS to attempt a full TCP connection.
|| || || || || || || || || || || || || || || || || ||




This type of scan is less stealthy.
|| || || || || ||




Nmap Port Scan: TCP flags - ✔✔You can scan by setting TCP headers in unusual ways.
|| || || || || || || || || || || || || || || ||




A Null (-sN) scan sets the header bit to zero, a FIN (-sF) scan sends an unexpected FIN packet,
|| || || || || || || || || || || || || || || || || || ||




and an Xmas scan (-sX) sets the FIN, PSH, and URG flags.
|| || || || || || || || || || || ||




This was a means of defeating early types of firewalls and IDS.
|| || || || || || || || || || ||

Geschreven voor

Instelling
Vulnerability Management
Vak
Vulnerability Management

Documentinformatie

Geüpload op
4 april 2026
Aantal pagina's
36
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$21.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Ruiz Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
96
Lid sinds
1 jaar
Aantal volgers
1
Documenten
13905
Laatst verkocht
3 weken geleden
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.2

15 beoordelingen

5
4
4
4
3
2
2
1
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen