If Lori is supposed to scan all known TCP ports, how many ports should she select in the software?

Lori has just been tasked by her supervisor toonduct vulnerability scan on the corporate network.She has been instructed to perform a very thorough test of the network to ensure that there are no security holes on any of the machines.Lori’s company does not own any commercial scanning products, so she decides to download a free one off the Internet.Lori has never done a vulnerability scan before, so she is unsure of some of the settings available in the software she downloaded.One of the options is to choose which ports that can be scanned.Lori wants to do exactly what her boss has told her, but she does not know what ports should be scanned.

If Lori is supposed to scan all known TCP ports, how many ports should she select in the software?

Lori has just been tasked by her supervisor toonduct vulnerability scan on the corporate network.She has been instructed to perform a very thorough test of the network to ensure that there are no security holes on any of the machines.Lori’s company does not own any commercial scanning products, so she decides to download a free one off the Internet.Lori has never done a vulnerability scan before, so she is unsure of some of the settings available in the software she downloaded.One of the options is to choose which ports that can be scanned.Lori wants to do exactly what her boss has told her, but she does not know what ports should be scanned.

If Lori is supposed to scan all known TCP ports, how many ports should she select in the software?

A.
1025

B.
1024

C.
65536

D.
Lori should not scan TCP ports, only UDP ports

Explanation:
In both TCP and UDP, each packet header will specify a source port and a destination port, each of which is a 16-bit unsigned integer (i.e. ranging from 0 to 65535).



Leave a Reply 0

Your email address will not be published. Required fields are marked *