Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 28 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 28
Topic #: 1
[All 312-50v12 Questions]

To create a botnet, the attacker can use several techniques to scan vulnerable machines. The attacker first collects information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list is divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time.
Which technique is discussed here?

  • A. Subnet scanning technique
  • B. Permutation scanning technique
  • C. Hit-list scanning technique.
  • D. Topological scanning technique
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
jeremy13
Highly Voted 1 year, 7 months ago
C - Hit-List scanning technique 312-50v11- questions 147 Module 10 P1429 V12 *Hit-list Scanning Through scanning, an attacker first collects a list of potentially vulnerable machines and then creates a zombie army. Subsequently, the attacker scans the list to find a vulnerable machine. On finding one, the attacker installs malicious code on it and divides the list in half. The attacker continues to scan one half, whereas the other half is scanned by the newly compromised machine. This process keeps repeating, causing the number of compromised machines to increase exponentially. This technique ensures the installation of malicious code on all the potentially vulnerable machines in the hit list within a short time. *Topological Scanning This technique uses the information obtained from an infected machine to find new vulnerable machines. An infected host checks for URLs in the hard drive of a machine that it wants to infect. Subsequently, it shortlists URLs and targets, and it checks their vulnerability. This technique yields accurate results, and its performance is similar to that of the hit-list scanning technique.
upvoted 15 times
...
Nicknp
Most Recent 6 months, 1 week ago
Selected Answer: C
Option C hitlist scanning technique
upvoted 1 times
...
SumanSantro
11 months ago
Selected Answer: C
Option C. Hit-list scanning technique. is the correct answer
upvoted 1 times
...
insaniunt
12 months ago
Selected Answer: C
C. Hit-list scanning technique
upvoted 1 times
...
eronmelo
1 year, 1 month ago
C. Hit-List Scanning Ebook CEHv12 Module 10 Page 1429
upvoted 1 times
...
Benignhack
1 year, 3 months ago
Selected Answer: C
c, hit list scanning
upvoted 1 times
...
ZacharyDriver
1 year, 4 months ago
Selected Answer: C
C. Hit-list Scanning Technique
upvoted 1 times
...
Henrikrp
1 year, 4 months ago
Selected Answer: C
C. Hit-list scanning technique.
upvoted 1 times
...
jeremy13
1 year, 6 months ago
Selected Answer: C
C. Hit-list scanning technique.
upvoted 1 times
...
sTaTiK
1 year, 6 months ago
Selected Answer: C
Anser is Hitlist: The technique discussed here is the Hit-list scanning technique. In the Hit-list scanning technique, the attacker creates a list of potential targets that are vulnerable to a specific exploit or attack. The attacker then uses this list to scan and infect the vulnerable machines. Once a machine is compromised, it can be used to scan for and infect other vulnerable machines on the list. The list is then divided among the compromised machines, and the scanning process continues until all the machines on the list are infected. This technique is often used to create botnets, which are networks of infected machines that can be controlled by the attacker. Botnets can be used for various purposes, such as launching DDoS attacks, stealing sensitive information, or distributing spam or malware. The Hit-list scanning technique allows the attacker to quickly infect a large number of machines and create a powerful botnet.
upvoted 4 times
...
Chipless
1 year, 7 months ago
Selected Answer: C
Hit-list Scanning SOURCE: CEH v12 eBook Module 10 pg 954
upvoted 3 times
...
eli117
1 year, 7 months ago
Selected Answer: C
C. Hit-list scanning technique. Explanation: The technique described in the scenario is known as the hit-list scanning technique, where an attacker compiles a list of potential targets, and then targets them by dividing the list and assigning each part to a different infected machine. This allows for simultaneous scanning, increasing the spread of the malicious code.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...