exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 53 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 53
Topic #: 1
[All 312-50v12 Questions]

You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: “The attacker must scan every port on the server several times using a set of spoofed source IP addresses.” Suppose that you are using Nmap to perform this scan.
What flag will you use to satisfy this requirement?

  • A. The -g flag
  • B. The -A flag
  • C. The -f flag
  • D. The -D flag
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
eli117
Highly Voted 1 year, 3 months ago
Selected Answer: D
D. The -D flag Explanation: The scenario describes a specific condition for a penetration testing scan, where the tester is required to scan every port on a server several times using a set of spoofed source IP addresses. The tester is using Nmap to perform the scan and needs to know which flag to use to satisfy this requirement. The -D flag is used in Nmap to specify a decoy scan. A decoy scan involves sending packets with spoofed IP addresses in order to disguise the true source of the scan. This can be used to make it more difficult for network intrusion detection systems (NIDS) to detect the scan, as well as to confuse the target system about the true source of the traffic. To use the -D flag, the tester specifies a list of decoy IP addresses to be used in the scan. These decoy addresses will be interspersed with the true source IP address in the scan traffic.
upvoted 12 times
...
Ayan1855
Most Recent 3 days, 2 hours ago
Selected Answer: D
The -D flag
upvoted 1 times
...
[Removed]
7 months ago
Selected Answer: D
D. The -D flag is the correct answer. Another correct answer would be the -S flag (Spoof Source Address), but the -S flag is not a listed option. So the -D flag that is listed is the correct answer. This was an exam question for me when I took the exam on 13 Dec 2023.
upvoted 4 times
...
insaniunt
7 months, 1 week ago
D. The -D flag
upvoted 1 times
...
581777a
11 months, 2 weeks ago
Selected Answer: D
D. The -D flag
upvoted 1 times
...
Vincent_Lu
1 year, 1 month ago
D. The -D flag -------------------------------- IP Address Decoy nmap -D a.a.a.a,b.b.b.b,c.c.c.c {Target IP} IP Address Spoofing nmap -S a.a.a.a {Target IP}
upvoted 2 times
qtygbapjpesdayazko
4 months, 1 week ago
This is the way
upvoted 1 times
...
...
tc5899
1 year, 3 months ago
-D for decoy
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago