exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 206 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 206
Topic #: 1
[All 312-50v12 Questions]

An ethical hacker is performing a network scan to evaluate the security of a company's IT infrastructure. During the scan, he discovers an active host with multiple open ports running various services. The hacker uses TCP communication flags to establish a connection with the host and starts communicating with it. He sends a SYN packet to a port on the host and receives a SYN/ACK packet back. He then sends an ACK packet for the received SYN/ACK packet, which triggers an open connection. Which of the following actions should the ethical hacker perform next?

  • A. Send a PSH packet to inform the receiving application about the buffered data.
  • B. Conduct a vulnerability scan on the open port to identify any potential weaknesses.
  • C. Scan another port on the same host using the SYN, ACK, and RST flags.
  • D. Send a FIN or RST packet to close the connection.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
agelbahri
3 weeks ago
Selected Answer: B
B. Conduct a vulnerability scan on the open port to identify any potential weaknesses
upvoted 1 times
...
KalingaDev
3 months, 2 weeks ago
Selected Answer: B
Since this is an ethical hacking operation, the hacker should proceed with scanning for vulns. for those who chose 'D', this would be making since if this operation is being conducted illegally.
upvoted 1 times
...
blehbleh
4 months ago
Selected Answer: B
I'm pretty sure this is B as an ethical hacker you need to see if there are any vulnerabilities. You can't just tell them at the end of the pentest that they had open ports but without and validation as to if it is a security concern or not. You would not be doing your job as the pentester. You would just be scanning a network without any knowledge of if anything is vulnerable or not.
upvoted 1 times
...
azdan
6 months, 4 weeks ago
Selected Answer: D
Keyword is the ethical hacker perform next.
upvoted 1 times
...
kevin403
7 months, 2 weeks ago
Selected Answer: D
Key sentence “ An ethical hacker is performing a network scan to evaluate the security of a company's IT infrastructure” his role here didn’t mention anything about scanning for vuln nor having permission to do so. Hence he RST and move on. Ethical hacking is all about getting the permission from the owner to do a specific task, in this case. Network scan only
upvoted 1 times
...
GK2205
8 months, 2 weeks ago
Selected Answer: D
Another one that is tricky because of nuance: The Ethical Hacker is performing a network scan and not necessarily a vulnerability scan. Network scans do not travers into vulnerability scans although if required we would do so. The context of the question is key here IMHO. One thing is very clear throughout the program, as a CEH your job is to do no harm and not to compromise. i.e. When you gain access to a sensitive database you are to report on it, not enter and potentially exploit it. Similarly here, your scope is a network scan, not a vulnerability scan. So RST and move on.
upvoted 2 times
...
Truth_Seeker
8 months, 3 weeks ago
I think the correct answer is D it is a common practice across various network scanning tools to ensure that connections are properly managed and closed. Therefore, the conclusion about closing connections with a FIN or RST packet after a scan is applicable to most network scanners, not just Nmap
upvoted 1 times
...
MustafaDDD
1 year, 1 month ago
Selected Answer: B
I am just thinking, the question says, "An ethical hacker is performing a network scan to evaluate the security of a company's IT infrastructure", why would the hacker close the session?
upvoted 3 times
...
qwerty100
1 year, 1 month ago
Selected Answer: B
B. Conduct a vulnerability scan on the open port to identify any potential weaknesses.
upvoted 3 times
This is the way. He start the con on the port, way do a reset? so scan the port for vulns.
upvoted 1 times
...
...
qwerty100
1 year, 1 month ago
B. Conduct a vulnerability scan on the open port to identify any potential weaknesses.
upvoted 3 times
...
insaniunt
1 year, 1 month ago
Selected Answer: D
D, I think The ethical hacker must send a FIN or RST packet to terminate the connection
upvoted 2 times
...
xbsumz
1 year, 1 month ago
Could someone help me confirm the validity of this ethical hacking technique
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago