Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 203 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 203
Topic #: 1
[All 312-50v12 Questions]

An ethical hacker is hired to conduct a comprehensive network scan of a large organization that strongly suspects potential intrusions into their internal systems. The hacker decides to employ a combination of scanning tools to obtain a detailed understanding of the network. Which sequence of actions would provide the most comprehensive information about the network's status?

  • A. Use Hping3 for an ICMP ping scan on the entire subnet, then use Nmap for a SYN scan on identified active hosts, and finally use Metasploit to exploit identified vulnerabilities.
  • B. Start with Hping3 for a UDP scan on random ports, then use Nmap for a version detection scan, and finally use Metasploit to exploit detected vulnerabilities.
  • C. Begin with NetScanTools Pro for a general network scan, then use Nmap for OS detection and version detection, and finally perform an SYN flooding with Hping3.
  • D. Initiate with Nmap for a ping sweep, then use Metasploit to scan for open ports and services, and finally use Hping3 to perform remote OS fingerprinting.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
qtygbapjpesdayazko
8 months, 3 weeks ago
Selected Answer: D
D. Initiate with Nmap for a ping sweep, then use Metasploit to scan for open ports and services, and finally use Hping3 to perform remote OS fingerprinting. the key word is "network's status" and not exploit vulns or attack the network.
upvoted 1 times
...
przemyslaw1
9 months, 1 week ago
Selected Answer: D
D. Initiate with Nmap for a ping sweep, then use Metasploit to scan for open ports and services, and finally use Hping3 to perform remote OS fingerprinting.
upvoted 2 times
...
Unr34l
9 months, 1 week ago
D. Initiate with Nmap for a ping sweep, then use Metasploit to scan for open ports and services, and finally use Hping3 to perform remote OS fingerprinting. Explanation: The most comprehensive sequence of actions for obtaining detailed information about the network's status involves using various tools for different purposes. The recommended sequence is: Nmap for a ping sweep: This helps identify live hosts on the network. Metasploit to scan for open ports and services: This provides information about the services running on the identified hosts. Hping3 to perform remote OS fingerprinting: This helps in determining the operating system of the target hosts based on their responses. Option D outlines this sequence of actions, making it the most appropriate for obtaining comprehensive information about the network's status.
upvoted 3 times
...
xbsumz
9 months, 2 weeks ago
Im not certain about this ethical hacking concept
upvoted 1 times
...
insaniunt
9 months, 2 weeks ago
Selected Answer: C
C. Begin with NetScanTools Pro for a general network scan, then use Nmap for OS detection and version detection, and finally perform an SYN flooding with Hping3. because of the question "Which sequence of actions would provide the most comprehensive information about the network's status?" and de A alternative talk about exploit (???)
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...