What can be deduced when a tester enters the nmap -sF command to perform a TCP FIN scan and the target host port does not respond?

IT Questions BankCategory: Ethical HackerWhat can be deduced when a tester enters the nmap -sF command to perform a TCP FIN scan and the target host port does not respond?

What can be deduced when a tester enters the nmap -sF command to perform a TCP FIN scan and the target host port does not respond?

  • that the port is not responding to TCP traffic
  • that the port is listening for UDP traffic
  • that the port is open
  • that the port is not ready to close the TCP connection

Explanation: If nothing is received from the target port in response to a TCP FIN scan, the port can be considered open because the normal behavior is to ignore the FIN packet. If the port is closed, the target system sends back an RST packet.

Exam with this question: 3.5.3 Quiz - Information Gathering and Vulnerability Scanning Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments