Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 206 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 206
Topic #: 1
[All 312-50v12 Questions]

An ethical hacker is performing a network scan to evaluate the security of a company's IT infrastructure. During the scan, he discovers an active host with multiple open ports running various services. The hacker uses TCP communication flags to establish a connection with the host and starts communicating with it. He sends a SYN packet to a port on the host and receives a SYN/ACK packet back. He then sends an ACK packet for the received SYN/ACK packet, which triggers an open connection. Which of the following actions should the ethical hacker perform next?

  • A. Send a PSH packet to inform the receiving application about the buffered data.
  • B. Conduct a vulnerability scan on the open port to identify any potential weaknesses.
  • C. Scan another port on the same host using the SYN, ACK, and RST flags.
  • D. Send a FIN or RST packet to close the connection.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
azdan
2 months, 2 weeks ago
Selected Answer: D
Keyword is the ethical hacker perform next.
upvoted 1 times
...
kevin403
3 months, 1 week ago
Selected Answer: D
Key sentence “ An ethical hacker is performing a network scan to evaluate the security of a company's IT infrastructure” his role here didn’t mention anything about scanning for vuln nor having permission to do so. Hence he RST and move on. Ethical hacking is all about getting the permission from the owner to do a specific task, in this case. Network scan only
upvoted 1 times
...
GK2205
4 months ago
Selected Answer: D
Another one that is tricky because of nuance: The Ethical Hacker is performing a network scan and not necessarily a vulnerability scan. Network scans do not travers into vulnerability scans although if required we would do so. The context of the question is key here IMHO. One thing is very clear throughout the program, as a CEH your job is to do no harm and not to compromise. i.e. When you gain access to a sensitive database you are to report on it, not enter and potentially exploit it. Similarly here, your scope is a network scan, not a vulnerability scan. So RST and move on.
upvoted 2 times
...
Truth_Seeker
4 months, 1 week ago
I think the correct answer is D it is a common practice across various network scanning tools to ensure that connections are properly managed and closed. Therefore, the conclusion about closing connections with a FIN or RST packet after a scan is applicable to most network scanners, not just Nmap
upvoted 1 times
...
MustafaDDD
8 months, 4 weeks ago
Selected Answer: B
I am just thinking, the question says, "An ethical hacker is performing a network scan to evaluate the security of a company's IT infrastructure", why would the hacker close the session?
upvoted 2 times
...
qwerty100
9 months ago
Selected Answer: B
B. Conduct a vulnerability scan on the open port to identify any potential weaknesses.
upvoted 3 times
qtygbapjpesdayazko
8 months, 1 week ago
This is the way. He start the con on the port, way do a reset? so scan the port for vulns.
upvoted 1 times
...
...
qwerty100
9 months ago
B. Conduct a vulnerability scan on the open port to identify any potential weaknesses.
upvoted 3 times
...
insaniunt
9 months, 1 week ago
Selected Answer: D
D, I think The ethical hacker must send a FIN or RST packet to terminate the connection
upvoted 2 times
...
xbsumz
9 months, 2 weeks ago
Could someone help me confirm the validity of this ethical hacking technique
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...