1. Which of the following is a process of scanning and monitoring the captured data packets passing through a network?
A) Packet Crafting
B) Packet Inspection
C) Sniffing
D) Enumeration
2. Which of the following procedures is used when software binaries need to be converted into clear text format in a high-level language?
A) Decompilation
B) Debugging
C) Eavesdropping
D) None of the above
3. Select the automated utilities that are specially developed to detect vulnerabilities, weaknesses, problems, and loopholes in an operating system, network, software, and application.
A) Vulnerability Scanner
B) Vulnerability Mapping
C) Application Scan
D) None of the above
4. Which one of the following types of scan ensures that the targeted host is alive and the connection is complete?
A) Stealth Scan
B) Full Scan
C) Half Scan
D) Discovery Scan
5. Select the type of scan that identifies the operating systems running on a network, maps those systems to IP addresses, and enumerates the open ports and services on those systems?
A) Full Scan
B) Half Scan
C) Stealth Scan
D) Discovery Scan