Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 147 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 147
Topic #: 1
[All 312-50v12 Questions]

During a red team assessment, a CEH is given a task to perform network scanning on the target network without revealing its IP address. They are also required to find an open port and the services available on the target machine. What scanning technique should they employ, and which command in Zenmap should they use?

  • A. Use SCTP INIT Scan with the command "-sY"
  • B. Use UDP Raw ICMP Port Unreachable Scanning with the command "-sU"
  • C. Use the ACK flag probe scanning technique with the command "-sA"
  • D. Use the IDLE/IPID header scan technique with the command "-sI"
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
vibhorsharma1998.vs
8 months ago
D, IDLE SCAN is Correct because of spoofing
upvoted 1 times
...
qtygbapjpesdayazko
8 months, 1 week ago
Selected Answer: D
IDLE/IPID header scan - The attacker performs this scan by impersonating another computer via spoofing.
upvoted 1 times
...
JR22craft
9 months ago
Selected Answer: D
D. Use the IDLE/IPID header scan technique with the command "-sI"
upvoted 1 times
...
brrbrr
9 months, 1 week ago
Selected Answer: D
D. • Allows for blind port scanning (without sending any packet with own IP) • Utilizes IP address of a zombie machine through spoofed packets
upvoted 1 times
...
JustAName
9 months, 2 weeks ago
Selected Answer: D
D. IDLE/IPID scan spoof its ip while perform scanning
upvoted 1 times
...
insaniunt
9 months, 2 weeks ago
Selected Answer: D
IDLE/IPID header scan - The attacker performs this scan by impersonating another computer via spoofing. The attacker does not send a packet from their IP address; instead, they use another host, often called a “zombie,” to scan the remote host and identify open ports. In this attack, the attacker expects the sequence numbers of the zombie host, and if the remote host checks the IP of the scanning party, the IP of the zombie machine is displayed - Module 03 Page 315
upvoted 2 times
qtygbapjpesdayazko
8 months, 1 week ago
This is the way
upvoted 1 times
...
...
qwerty100
9 months, 2 weeks ago
Selected Answer: D
D. Use the IDLE/IPID header scan technique with the command "-sI"
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...