exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 110 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 110
Topic #: 1
[All 312-50v11 Questions]

Which of the following tools can be used for passive OS fingerprinting?

  • A. nmap
  • B. tcpdump
  • C. tracert
  • D. ping
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
adespino
Highly Voted 2 years, 2 months ago
Passive OS fingerprinting involves sniffing network traffic at any given collection point and matching known patterns that pass to a table of pre-established OS identities. No traffic is sent with passive fingerprinting. Nmap does not use a passive style of fingerprinting. Instead it performs its Operating System Fingerprinting Scan (OSFS) via active methodologies.
upvoted 14 times
...
Scryptic
Highly Voted 2 years, 1 month ago
The key here is the word 'passive.' NMAP is active and does the hard work for you. It's also noisy. TCPDUMP will capture the network traffic (ala WireShark) but it doesn't do any OS fingerprinting. It leaves that work up to you, analyzing the captured data.
upvoted 10 times
...
qovert
Most Recent 6 months, 4 weeks ago
Answer: B Tcpdump is a tool that can be used for passive OS fingerprinting. It is a packet sniffer that captures network traffic and allows analysts to examine the contents of individual packets. By observing specific characteristics of the packets, such as the Time To Live (TTL) value or specific flags, an analyst can infer information about the operating system of the device sending those packets. This process is passive because it doesn't require direct interaction with the target system, as the information is collected by simply monitoring the network traffic.
upvoted 1 times
...
Daniel8660
1 year ago
Selected Answer: B
OS Discovery/Banner Grabbing Passive Banner Grabbing Sniffing the network traffic - Capturing and analyzing packets from the target. (P.337/321)
upvoted 3 times
...
damienronce
1 year, 1 month ago
Selected Answer: B
tcpdump is PASSIVE (Work like wireshark) nmap is ACTIVE (nmap -O) https://explainshell.com/explain?cmd=nmap+-O tracert (you cant do anything with it to determine the os)
upvoted 3 times
...
SeaH0rse66
1 year, 4 months ago
Selected Answer: B
Tcpdump is the correct answer. Nmap is incorrect as it's active not passive OS fingerprinting The two other responses are not OS fingerprinting tracers (traceroute) and ping commands can't OS fingerprinting
upvoted 1 times
...
Urltenm
1 year, 8 months ago
easy explanation - you can find fingerprints from file pcap or other. you do do not need to interact with victim right now....
upvoted 1 times
...
peace_iron
1 year, 9 months ago
The correct answer is TCPDUMP. Tcpdump's other interesting feature is passive operating system fingerprinting is built into pf and tcpdump (both ipv4 and ipv6 wise), you can now turn it on by using -o option in tcpdump. shell>tcpdump -o -nni em0
upvoted 3 times
...
Jasonxxx
1 year, 10 months ago
Selected Answer: B
tcpdump is the correct answer
upvoted 2 times
...
AjaxFar
1 year, 10 months ago
Tcpdump is the correct answer, judging from technical view. Nmap : will work with life system son ping too to know if the system is On, traceout to know different routes the system has passed while onli not offline
upvoted 1 times
...
Snipa_x
2 years, 1 month ago
Correct answer is TCPDUMP. Packet capturing is passive while NMAP does use active methods for probing and scanning.
upvoted 2 times
...
RazaNathani
2 years, 2 months ago
tcpdump is the correct answer.
upvoted 3 times
...
illuded03jolted
2 years, 2 months ago
The answer is incorrect, the correct answer is nmap. Tcpdump prints the contents of network packet, wherein, nmap is used for probing computer networks, including host discovery and service and operating system detection.
upvoted 2 times
brdweek
2 years, 1 month ago
Nmap scanning OS with packet sending. tcpdump sniff the traffic and can quess the OS with TTL params and etc (PASSIVE)
upvoted 3 times
...
volatile
1 year, 4 months ago
Wrong. Nmap is active. Not passive
upvoted 1 times
...
...
ANDRESCB1988
2 years, 3 months ago
correct
upvoted 2 times
illuded03jolted
2 years, 2 months ago
You seem to be a rouge Bot. Seen you posting incorrect answers for a lot of other questions as well.
upvoted 5 times
Scryptic
2 years, 1 month ago
All he ever posts is 'Correct' never explanations, arguments or references. Clueless.
upvoted 5 times
...
illuded03jolted
2 years, 2 months ago
***** rogue
upvoted 3 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago