Study for the Ethical Hacking Essentials Test. Explore interactive flashcards and multiple-choice questions with hints and explanations. Prepare thoroughly and boost your exam readiness!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Mark’s action of scanning for open ports to exploit is an example of what kind of attack?

  1. Phishing attack

  2. Network scanning

  3. Denial of Service

  4. Malware injection

The correct answer is: Network scanning

The action of scanning for open ports to exploit is classified as network scanning because it involves systematically identifying the live hosts on a network and determining which ports on these hosts are open and listening for connections. This technique is fundamental in ethical hacking and penetration testing for gathering information about potential vulnerabilities in a target system. Network scanning is a critical phase in the reconnaissance process, where the ethical hacker assesses the network infrastructure and identifies potential entry points. Port scanning helps attackers, both malicious and ethical, to understand the services running on a device, which may reveal opportunities for exploitation, if vulnerabilities exist in those services. The other alternatives are distinct in purpose and execution. Phishing attacks involve tricking individuals into revealing sensitive information, typically through deceitful emails or messages. Denial of Service attacks aim to disrupt the availability of services by overwhelming them with traffic, causing legitimate users to lose access. Malware injection refers to the method of placing malicious software into a system to compromise its integrity or gain unauthorized access. Each of these methods serves different objectives and employs different tactics than network scanning.