• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

What can be deduced when a tester enters the nmap -sF command to perform a TCP FIN scan and the target host port does not respond?

  • that the port is open 
  • that the port is not responding to TCP traffic 
  • that the port is listening for UDP traffic 
  • that the port is not ready to close the TCP connection

Explanation & Hint:

If nothing is received from the target port in response to a TCP FIN scan, the port can be considered open because the normal behavior is to ignore the FIN packet. If the port is closed, the target system sends back an RST packet.

For more Questions and Answers:

3.5.3 Quiz – Information Gathering and Vulnerability Scanning Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments