Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 62 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 62
Topic #: 1
[All 312-50v12 Questions]

Which of the following allows attackers to draw a map or outline the target organization's network infrastructure to know about the actual environment that they are going to hack?

  • A. Vulnerability analysis
  • B. Malware analysis
  • C. Scanning networks
  • D. Enumeration
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
eli117
Highly Voted 1 year, 7 months ago
Selected Answer: C
C. Scanning networks Scanning networks allows attackers to draw a map or outline the target organization's network infrastructure to know about the actual environment that they are going to hack. Scanning can help the attacker identify the IP addresses, operating systems, open ports, and running services of the systems connected to the target network. This information can then be used to identify vulnerabilities and plan further attacks.
upvoted 10 times
...
g_man_rap
Most Recent 7 months ago
C. Scanning networks: Network scanning is the process of actively probing a network or systems using tools to discover devices and their details. This would include IP addresses, open ports, services running, and other characteristics. This process is essential for attackers to draw a map or outline of a network infrastructure. D. Enumeration: Enumeration is a process that goes a step further than scanning. It involves extracting user names, machine names, network resources, shares, and services from a system. While enumeration can provide detailed information and could be part of the process to understand the target environment, it is typically done after scanning networks.
upvoted 3 times
...
qtygbapjpesdayazko
8 months, 1 week ago
Selected Answer: C
C. Scanning networks
upvoted 1 times
...
I_Know_Everything_KY
9 months, 2 weeks ago
Selected Answer: D
Answer is D: Enumeration. CEH 50V12 Book: Enumeration P357 Pre-Assessment Phase - - Identify Assets and Create a Baseline 5. Understand the network architecture and map the network infrastructure "Scanning networks" makes no mention of mapping.
upvoted 1 times
...
I_Know_Everything_KY
9 months, 2 weeks ago
Answer is D: Enumeration. CEH 50V12 Book: Enumeration P357 Pre-Assessment Phase - - Identify Assets and Create a Baseline 5. Understand the network architecture and map the network infrastructure "Scanning networks" makes no mention of mapping.
upvoted 1 times
...
insaniunt
11 months, 1 week ago
Selected Answer: C
C. Scanning networks Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response
upvoted 1 times
...
IPconfig
1 year ago
Selected Answer: C
C. Scanning networks
upvoted 1 times
...
iitc_duo
1 year, 1 month ago
D. Enumeration Enumeration is the process of extracting information about a target network or system. It allows attackers to gather details about the network infrastructure, such as the IP addresses of active hosts, open ports, services running on those ports, and sometimes even user accounts. This information can help attackers create a map or outline of the target organization's network infrastructure, enabling them to better understand the environment they plan to attack. Enumeration is a reconnaissance technique used by attackers as a preparatory step in hacking.
upvoted 3 times
...
581777a
1 year, 3 months ago
Selected Answer: D
D. Enumeration Enumeration involves gathering information about a target network, such as identifying active hosts, open ports, and network services. Attackers use enumeration to create a map or outline of the target organization's network infrastructure, which helps them understand the environment they are planning to exploit. This information is valuable for planning and executing further attacks on the network.
upvoted 3 times
...
ZacharyDriver
1 year, 4 months ago
Selected Answer: C
C. Scanning Networks
upvoted 1 times
...
naija4life
1 year, 4 months ago
Selected Answer: D
D. Enumeration Enumeration in cyber security is extracting a system's valid usernames, machine names, share names, directory names, and other information.
upvoted 2 times
...
Vincent_Lu
1 year, 5 months ago
C. Scanning networks
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...