exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 84 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 84
Topic #: 1
[All 312-50v13 Questions]

Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network. Which of the following host discovery techniques must he use to perform the given task?

  • A. UDP scan
  • B. ARP ping scan
  • C. ACK flag probe scan
  • D. TCP Maimon scan
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mulekule
4 weeks, 1 day ago
Selected Answer: B
ARP ping scan is correct. The rest are used primary for port scanning, not host discovery.
upvoted 1 times
...
NikoTomas
1 month, 3 weeks ago
Selected Answer: A
Correct: A (UDP scan) Question: Discovering devices hidden by RESTRICTIVE FW - for me it means you are NOT inside the network but behind the FW. So you can't use ARP resolution, which is L2 protocol working only inside the LAN. As FW is restrictive (supposedly stateful), it will for sure block incomplete TCP sessions - i. e. ACK flag scan will be blocked by FW (no session exists on FW). TCP Maimon scan will be blocked by FW as well - like ACK scan, Maimon is also based on incomplete TCP session with FIN/ACK flags set (no session exists on FW). UDP scan: • Many FWs struggle to track UDP sessions (UDP is stateless, no handshake like TCP). • Some FWs mistakenly assume that UDP is harmless and allow it without strict filtering. • UDP scanning can identify misconfigured firewall rules, revealing hidden services. • Many FWs focus on filtering TCP traffic because most applications use TCP. • UDP is often less restricted as it is required for essential services like DNS (53), SNMP (161) and DHCP (67/68). • UDP scanning can identify open services that a FW does not properly restrict.
upvoted 1 times
...
killwitch
2 months ago
Selected Answer: B
B. ARP ping scan. ARP (Address Resolution Protocol) ping scan works at the link layer (Layer 2) and does not rely on IP-based scanning techniques like TCP or UDP. Since firewalls typically block ICMP pings and other IP-based scans, an ARP scan bypasses these restrictions by directly querying MAC addresses in the local network. This method is highly effective in discovering all active hosts on a LAN because all devices must respond to ARP requests.
upvoted 1 times
...
getaseadsss
2 months, 1 week ago
Selected Answer: C
ACK scan
upvoted 1 times
...
Dogeo
3 months ago
Selected Answer: C
An ACK flag probe scan is used to discover active hosts behind a restrictive firewall by sending TCP packets with the ACK flag set.
upvoted 1 times
...
pindinga1
3 months, 1 week ago
Selected Answer: B
This correct answer is ARP ping scan
upvoted 3 times
...
rmycyc
3 months, 1 week ago
Selected Answer: B
How it works: Sends ARP (Address Resolution Protocol) requests to discover devices on the same local network segment. Use case: Highly effective for host discovery within the same subnet because ARP is a layer 2 protocol and is rarely blocked by firewalls. Suitability: This is the best choice for discovering active devices hidden by a restrictive firewall, especially if the target network is within the same subnet.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago