Which practice is used to identify exposed ports by actively sending requests?

Prepare for the EC-Council Certified Ethical Hacker (CEH) Exam. Use flashcards and multiple-choice questions with hints and explanations. Enhance your cyber security knowledge and get ready for the exam!

Multiple Choice

Which practice is used to identify exposed ports by actively sending requests?

Explanation:
Active scanning is the practice of sending packets to a target to discover which ports are open and what services are listening. By probing ports with requests, you create a live map of the network surface, revealing exposed ports, running services, and potentially misconfigurations. This direct probing is what lets you identify what an attacker could reach. Passive sniffing, in contrast, only listens to traffic that’s already on the network and cannot reliably reveal which ports are exposed since it doesn’t cause any responses from the target. Social engineering focuses on manipulating people to gain access or information, not on discovering network ports. Credential stuffing targets authentication weaknesses, not port discovery.

Active scanning is the practice of sending packets to a target to discover which ports are open and what services are listening. By probing ports with requests, you create a live map of the network surface, revealing exposed ports, running services, and potentially misconfigurations. This direct probing is what lets you identify what an attacker could reach.

Passive sniffing, in contrast, only listens to traffic that’s already on the network and cannot reliably reveal which ports are exposed since it doesn’t cause any responses from the target. Social engineering focuses on manipulating people to gain access or information, not on discovering network ports. Credential stuffing targets authentication weaknesses, not port discovery.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy