0
0
Cybersecurityknowledge~5 mins

Scanning and enumeration in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is the main purpose of scanning in cybersecurity?
Scanning is used to discover live hosts, open ports, and services on a network to identify potential targets for further analysis.
Click to reveal answer
beginner
Define enumeration in the context of cybersecurity.
Enumeration is the process of gathering detailed information about network resources, users, shares, and services after scanning has identified potential targets.
Click to reveal answer
intermediate
How does scanning differ from enumeration?
Scanning identifies live systems and open ports, while enumeration digs deeper to extract detailed information like usernames, network shares, and service versions.
Click to reveal answer
beginner
Name two common tools used for scanning and enumeration.
Nmap is widely used for scanning networks and ports. Tools like NetBIOS enumeration tools or SNMPwalk are used for enumeration to gather detailed network information.
Click to reveal answer
intermediate
Why is scanning and enumeration important in penetration testing?
They help identify vulnerabilities by mapping the network and gathering detailed information, which guides the tester to exploit weaknesses effectively.
Click to reveal answer
What does scanning primarily detect in a network?
ALive hosts and open ports
BUser passwords
CMalware infections
DFirewall rules
Which process involves gathering usernames and network shares?
AScanning
BPhishing
CExploitation
DEnumeration
Which tool is commonly used for network scanning?
AWireshark
BMetasploit
CNmap
DJohn the Ripper
What is the next step after scanning in a penetration test?
AEnumeration
BReporting
CExploitation
DPassword cracking
Why should scanning and enumeration be done carefully?
AThey delete important files
BThey can alert network defenders
CThey always cause system crashes
DThey are illegal in all cases
Explain the difference between scanning and enumeration in cybersecurity.
Think about what each step discovers about the network.
You got /2 concepts.
    Describe why scanning and enumeration are important steps in penetration testing.
    Consider how these steps help a tester understand the network.
    You got /4 concepts.